El Diario del CISO El Diario del CISO (The CISO Journal) Edición 28 | Page 7

12.5m Business Email Accounts Accessible via Web 150 Bugs Found in the Hack the Marine Corps Challenge 18 Vulnerabilities Found in Foxit PDF Reader Apollo Faces Criticism for Breach of 200 Million Contacts Credential-Phishing Attempts Highest on Tuesdays DevOps Producing More Insecure Apps Than Ever DHS Moves to Defend Infrastructure Across Sectors Did Chinese Spies Really Put a Chip in It? Fin7 Hackers Breached US Chain Burgerville Facebook: No Evidence of Third-Party App Access Failure to Protect Data Costs Bupa £175,000 Fake News Domains Spoof UK News Sites Adobe fixes 47 critical flaws in Acrobat and Reader APTs are targeting IT service providers You gotta fight, for your right, to erasure Bridging the priority gap between IT and security in DevOps California Governor signs strong net neutrality protections into law Can we trust digital forensic evidence? China allegedly infiltrated US companies through implanted hardware backdoors Emerging technologies lag in criticality while key skills remain a barrier Even with internal focus, most companies utilize external resources for cybersecurity For some cloud services more than 75% of accounts are utilized by hackers Heading into October Patch Tuesday on the heels of big announcements from Microsoft How to minimize the negative effect of mobile device loss or theft Identity fraudsters are getting better and better at what they do In terms of main threat actors, expectation rarely matches reality It only takes one data point to blow open a threat investigation MoD Launches Cyber Cadet Training Program NCSC: Russia’s GRU to Blame for DNC and Other Attacks Password Security Better, Still Poses Business Risk Phishing Attack Impersonates Law Firm Ransomware Casts Anchor at the Port of San Diego ReliaQuest Gifts $1m to Build Cyber Lab at USF Researchers Call for a Shared Dark Web Taxonomy Security Serious' Unsung Heroes Awards Winners Announced Tesco Bank Fined £16m+ After 2016 Cyber Heist Torii IoT Botnet Takes Mirai to a New Level Tory App Snafu Exposes Ministers’ Personal Info Twitter Updates Aim to Improve Election Integrity Latest Building Security In Maturity Model reflects software security initiatives of 120 firms Most enterprises highly vulnerable to security events caused by cloud misconfiguration Most organizations believe hackers can penetrate their network New IoT legislation bans shared default passwords Organizations need to shift strategies, adopt a proactive approach to cybersecurity Popular TP-Link wireless home router open to remote hijacking Python-based attack tools are the most common vector for launching exploit attempts Quantifying a firm's security levels may strengthen security over time Regularly updating your wireless router is not enough to ward off attacks Safe IT/OT integration with unidirectional security gateways The ultimate fallout from the Facebook data breach could be massive True password behaviors in the workplace revealed Vulnerable Android password managers make phishing attacks easier Worldwide spending on cloud IT infrastructure continues to grow, reaches $15.4 billion WWW inventor announces Solid, a push to create a decentralized web users can trust