El Diario del CISO El Diario del CISO (The CISO Journal) Edición 28 | Page 7
12.5m Business Email Accounts Accessible via Web
150 Bugs Found in the Hack the Marine Corps Challenge
18 Vulnerabilities Found in Foxit PDF Reader
Apollo Faces Criticism for Breach of 200 Million Contacts
Credential-Phishing Attempts Highest on Tuesdays
DevOps Producing More Insecure Apps Than Ever
DHS Moves to Defend Infrastructure Across Sectors
Did Chinese Spies Really Put a Chip in It?
Fin7 Hackers Breached US Chain Burgerville
Facebook: No Evidence of Third-Party App Access
Failure to Protect Data Costs Bupa £175,000
Fake News Domains Spoof UK News Sites
Adobe fixes 47 critical flaws in Acrobat and Reader
APTs are targeting IT service providers
You gotta fight, for your right, to erasure
Bridging the priority gap between IT and security in DevOps
California Governor signs strong net neutrality protections into law
Can we trust digital forensic evidence?
China allegedly infiltrated US companies through implanted hardware
backdoors
Emerging technologies lag in criticality while key skills remain a barrier
Even with internal focus, most companies utilize external resources for
cybersecurity
For some cloud services more than 75% of accounts are utilized by hackers
Heading into October Patch Tuesday on the heels of big announcements
from Microsoft
How to minimize the negative effect of mobile device loss or theft
Identity fraudsters are getting better and better at what they do
In terms of main threat actors, expectation rarely matches reality
It only takes one data point to blow open a threat investigation
MoD Launches Cyber Cadet Training Program
NCSC: Russia’s GRU to Blame for DNC and Other Attacks
Password Security Better, Still Poses Business Risk
Phishing Attack Impersonates Law Firm
Ransomware Casts Anchor at the Port of San Diego
ReliaQuest Gifts $1m to Build Cyber Lab at USF
Researchers Call for a Shared Dark Web Taxonomy
Security Serious' Unsung Heroes Awards Winners Announced
Tesco Bank Fined £16m+ After 2016 Cyber Heist
Torii IoT Botnet Takes Mirai to a New Level
Tory App Snafu Exposes Ministers’ Personal Info
Twitter Updates Aim to Improve Election Integrity
Latest Building Security In Maturity Model reflects software security
initiatives of 120 firms
Most enterprises highly vulnerable to security events caused by cloud
misconfiguration
Most organizations believe hackers can penetrate their network
New IoT legislation bans shared default passwords
Organizations need to shift strategies, adopt a proactive approach to
cybersecurity
Popular TP-Link wireless home router open to remote hijacking
Python-based attack tools are the most common vector for launching exploit
attempts
Quantifying a firm's security levels may strengthen security over time
Regularly updating your wireless router is not enough to ward off attacks
Safe IT/OT integration with unidirectional security gateways
The ultimate fallout from the Facebook data breach could be massive
True password behaviors in the workplace revealed
Vulnerable Android password managers make phishing attacks easier
Worldwide spending on cloud IT infrastructure continues to grow, reaches
$15.4 billion
WWW inventor announces Solid, a push to create a decentralized web users
can trust