El Diario del CISO El Diario del CISO (The CISO Journal) Edición 3 | Page 5
News1
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Pensando y Trabajando por
un Líder de Seguridad Digital
Cyber risk management: The
disconnect between business, security
teams | CSO Online Huddle House Suffers Payment Card
Breach | SecurityWeek.Com
Jon Oltsik is a principal analyst at Enterprise Strategy
Group ESG and has been quoted in the Wall Street
Journal, Business Week, and the New York Times. customers recently that their payment card
2020 security predictions: What to look for and how to benefit
451 Research: Security is top data management challenge
Add cybersecurity to Doomsday Clock concerns, says Bulletin of Atomic Scientists
Bank OZK's vulnerability risk index shows patching priorities everyone
understands
Can owning your company’s encryption lead to better security?
Cybersecurity: A global threat that we can control
Enabling Robust Security with Intent-based Segmentation
Hijacked Nest devices highlight the insecurity of the IoT
How polls are hacked: What every business should know
Phishing has become the root of most cyber-evil
Report: Over 59,000 GDPR data breach notifications, but only 91 fines
The new CISO's playbook: 5 rules to follow
Vendor allegedly assaults researcher who disclosed vulnerability
What is an advanced persistent threat (APT)? 5 signs you've been hit
What is phishing? How this cyber attack works and how to prevent it
Clever Phishing Attack Enlists Google
Translate to Spoof Facebook Login
Page
A tricky two-stage phishing scam is targeting Facebook
and Google credentials using a landing page that hides
behind Google's translate feature.
Collection #1 Data Dump Hacker Identified
Google Boosts Encryption For Low-End Android Devices
MacOS Zero-Day Exposes Apple Keychain Passwords
Microsoft Confirms Serious 'PrivExchange' Vulnerability
Spy Campaign Spams Pro-Tibet Group With ExileRAT
The APT Name Game: How Grim Threat Actors Get Goofy Monikers
Theory: 'Simple Hack' Behind Bezos’ Alleged Compromising Images
What are Data Manipulation Attacks, and How to Mitigate Against Them
Hack Attack Breaches Australian
Parliament Network
Hackers have breached the Australian Parliament's
network, although investigators say they have found no
evidence that attackers stole any data.
Bangladesh Bank Sues to Recover Funds After Cyber Heist
Failed Fraud Against UK Bank Abused Mobile Infrastructure
Fewer Breaches in 2018, But More Sensitive Data Spilled
German Antitrust Office Restricts Facebook Data Processing
Settlement Reached in Community Health Systems Breach Suit
Stolen RDP Credentials Live On After xDedic Takedown
Aetna Fined Yet Again for Exposing
HIV Information
California’s attorney general has slapped Aetna with a
substantial financial penalty in the latest enforcement
action against the health insurer following a 2017
Bolstering the Cybersecurity of Medical Devices
EHR Vendor Greenway Gets Hefty Fine for False Claims
Embracing Digital Risk Protection: Take Your Threat Intelligence to the Next Level
Health Data Breach Tally: What’s New?
Maximize Cybersecurity Risk Ratings in 2019
Huddle House, an Atlanta-based restaurant chain with
over 300 locations across the United States, informed
information may have been compromised as a result
of a security breach.
59,000 Breaches Disclosed in First Eight Months of GDPR
Chinese Hackers Spy on U.S. Law Firm, Major Norwegian MSP
Don't Let Huawei Help Set Up 5G, US Warns EU Nations
Don't Search for a Needle in a Haystack: Use Cases for Threat Intelligence
Lawmakers Concerned About Apple's Handling of FaceTime Spying Bug
Merkel Opens Spy Agency's Massive New Berlin HQ
New Backdoor Targets Linux Servers
New Canon Printers Bring SIEM Integration, Other Security Features
New LuckyCat-Linked RAT Targets Users in Tibet
RDP Servers Can Hack Client Devices: Researchers
Refrigeration Systems Used by Supermarkets, Hospitals Left Exposed Online
Researchers Identify Hacker Behind Massive Data Breach Collection
Study Analyzes Challenges, Concerns for IT/OT Convergence
Web App Security Firm Signal Sciences Raises $35 Million
Why Fighting Card-Not-Present Fraud Remains an Ongoing Challenge
Athens At The Center Of European
Cyber Security Strategy
Last January ENISA released its annual report with
the '15 top cyber threats and trends' in Europe.
Can AI Become Our New Cybersecurity Sheriff?
Cyber Security Risk in Retail and How to Handle It
Cybersecurity Starts With Access Control
ForbesBook AuthorVoice: Cybersecurity Skills for Top Performance: Beyond
Technical Skills
Multiple Airlines Exposed To Check-In Hijack Threat -- What Passengers Should
Do Next
Your New Car Is A Hacker Magnet -- Automotive Industry Disconnect To Blame
Organizations must adapt to 'norm'
under new data privacy regulations
With the increasing value of data, GDPR and
California's Consumer Privacy Act of 2018
demonstrate that data privacy policies will continue
to be a growing trend in 2019 and beyond.
10 worrisome ransomware predictions for 2019
Best practices for thwarting DNS hijacking attacks
Incorporating privacy into data protection strategy
The search for key tech talent will get harder and more costly in 2019
Your Next Move: Security operations center analyst
C-suite on the line - CyberTalk.org
A new phishing campaign specifically targets high-
level, c-suite executives to steal their Microsoft
Office 365 credentials.
A glimpse into the world of counterfeits on the dark web
Move over ransomware, cryptojacking is taking the spotlight
South African power company gets hit with a cybersecurity double header