El Diario del CISO El Diario del CISO (The CISO Journal) Edición 28 | Page 10

An Open Letter to Security Managers: Stop Trying to Do It All As IoT Security Concerns Rise, Are Solutions Keeping Up? Don't Overlook Your Data Blind Spots: 5 Tips for Protecting Unstructured Data Gazorp Malware Builder Offers Free, Customized AZORult Attacks on the Dark Web Sednit APT Group Uses First UEFI Rootkit Detected in the Wild to Execute LoJax Malware New ATM Attack Uses Custom Skimmers to Steal Credit Card Data and PINs SMB Security Best Practices: Why Smaller Businesses Face Bigger Risks The Inconvenient Truth About Your Eight-Character Password The Vinyasa of Security: Why Continuous Improvement Is Essential for Any Cybersecurity Strategy The Wild West of Data Risk Management in the Age of Cloud, Mobile and Digital Transformation Viro Botnet Uses Spamming and Keylogging Capabilities to Spread Ransomware Visibility and Control: A One-Two Punch for Securing iOS Devices in the Enterprise Why Healthcare Cyberattacks Should Concern Consumer Data Collectors 2.2 bn Facebook users must log out, re-login across devices: Experts Facebook hack: Facebook faces $1.63 billion in EU fine over fresh data breach Apple, Amazon deny Bloomberg report on Chinese hardware attack Facebook India: Latest Facebook breach piles on India worries facebook: Post-breach, Facebook resets access tokens of 50mn users; asks them to reboot account Astaroth Trojan Malware Returns to Infect South American Users Artificial Intelligence is key cybersecurity weapon in the IoT era: Research Continental ties up with IIT Madras for Cyber Security in Powertrain applications Encryption is the traditional but core enabler to maintain data privacy: Ian Yip, CTO, McAfee APAC Threatpost Artificial Intelligence: A Cybersecurity Tool for Good, and Sometimes Bad Dark Web Azorult Generator Offers Free Binaries to Cybercrooks Facebook Breach Sparks Concerns Around Third-Party Apps, Website Security Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration Sony Smart TV Bug Allows Remote Access, Root Privileges ThreatList: 83% of Routers Contain Vulnerable Code Threatpost New Wrap Podcast For Oct. 5 Virus Bulletin 2018: Turla APT Changes Shape with New Code and Targets Securitynow 7 Russian Spies Indicted in US for Hacking Anti-Doping Agencies Attackers Can Compromise Corporate Email Accounts for $150 facebook: What is the impact of the Facebook hack on you? IBM: Free flow of data should not be confused with data security: IBM's Harriet Green Securerityboulevar 100K Routers Hijacked for Phishing in GhostDNS Campaign Canada advances cybersecurity strategy to fend off nation-state attacks Google Cracks Down on Malicious Chrome Extensions Is Formal Education Critical for a Career in Cybersecurity? Ponemon Study Finds AI Can Help Close Security Gaps Privacy: Who’s Listening in the Workplace? Sophisticated IoT Botnet Torii Uses 6 Persistence Methods TheHackersNews Bank Servers Hacked to Trick ATMs into Spitting Out Millions in Cash Chinese Spying Chips Found Hidden On Servers Used By US Companies