El Diario del CISO El Diario del CISO (The CISO Journal) Edición 3 | Page 5

News1 EL DIARIO DEL CISO (THE CISO JOURNAL) Pensando y Trabajando por un Líder de Seguridad Digital Cyber risk management: The disconnect between business, security teams | CSO Online Huddle House Suffers Payment Card Breach | SecurityWeek.Com Jon Oltsik is a principal analyst at Enterprise Strategy Group ESG and has been quoted in the Wall Street Journal, Business Week, and the New York Times. customers recently that their payment card 2020 security predictions: What to look for and how to benefit 451 Research: Security is top data management challenge Add cybersecurity to Doomsday Clock concerns, says Bulletin of Atomic Scientists Bank OZK's vulnerability risk index shows patching priorities everyone understands Can owning your company’s encryption lead to better security? Cybersecurity: A global threat that we can control Enabling Robust Security with Intent-based Segmentation Hijacked Nest devices highlight the insecurity of the IoT How polls are hacked: What every business should know Phishing has become the root of most cyber-evil Report: Over 59,000 GDPR data breach notifications, but only 91 fines The new CISO's playbook: 5 rules to follow Vendor allegedly assaults researcher who disclosed vulnerability What is an advanced persistent threat (APT)? 5 signs you've been hit What is phishing? How this cyber attack works and how to prevent it Clever Phishing Attack Enlists Google Translate to Spoof Facebook Login Page A tricky two-stage phishing scam is targeting Facebook and Google credentials using a landing page that hides behind Google's translate feature. Collection #1 Data Dump Hacker Identified Google Boosts Encryption For Low-End Android Devices MacOS Zero-Day Exposes Apple Keychain Passwords Microsoft Confirms Serious 'PrivExchange' Vulnerability Spy Campaign Spams Pro-Tibet Group With ExileRAT The APT Name Game: How Grim Threat Actors Get Goofy Monikers Theory: 'Simple Hack' Behind Bezos’ Alleged Compromising Images What are Data Manipulation Attacks, and How to Mitigate Against Them Hack Attack Breaches Australian Parliament Network Hackers have breached the Australian Parliament's network, although investigators say they have found no evidence that attackers stole any data. Bangladesh Bank Sues to Recover Funds After Cyber Heist Failed Fraud Against UK Bank Abused Mobile Infrastructure Fewer Breaches in 2018, But More Sensitive Data Spilled German Antitrust Office Restricts Facebook Data Processing Settlement Reached in Community Health Systems Breach Suit Stolen RDP Credentials Live On After xDedic Takedown Aetna Fined Yet Again for Exposing HIV Information California’s attorney general has slapped Aetna with a substantial financial penalty in the latest enforcement action against the health insurer following a 2017 Bolstering the Cybersecurity of Medical Devices EHR Vendor Greenway Gets Hefty Fine for False Claims Embracing Digital Risk Protection: Take Your Threat Intelligence to the Next Level Health Data Breach Tally: What’s New? Maximize Cybersecurity Risk Ratings in 2019 Huddle House, an Atlanta-based restaurant chain with over 300 locations across the United States, informed information may have been compromised as a result of a security breach. 59,000 Breaches Disclosed in First Eight Months of GDPR Chinese Hackers Spy on U.S. Law Firm, Major Norwegian MSP Don't Let Huawei Help Set Up 5G, US Warns EU Nations Don't Search for a Needle in a Haystack: Use Cases for Threat Intelligence Lawmakers Concerned About Apple's Handling of FaceTime Spying Bug Merkel Opens Spy Agency's Massive New Berlin HQ New Backdoor Targets Linux Servers New Canon Printers Bring SIEM Integration, Other Security Features New LuckyCat-Linked RAT Targets Users in Tibet RDP Servers Can Hack Client Devices: Researchers Refrigeration Systems Used by Supermarkets, Hospitals Left Exposed Online Researchers Identify Hacker Behind Massive Data Breach Collection Study Analyzes Challenges, Concerns for IT/OT Convergence Web App Security Firm Signal Sciences Raises $35 Million Why Fighting Card-Not-Present Fraud Remains an Ongoing Challenge Athens At The Center Of European Cyber Security Strategy Last January ENISA released its annual report with the '15 top cyber threats and trends' in Europe. Can AI Become Our New Cybersecurity Sheriff? Cyber Security Risk in Retail and How to Handle It Cybersecurity Starts With Access Control ForbesBook AuthorVoice: Cybersecurity Skills for Top Performance: Beyond Technical Skills Multiple Airlines Exposed To Check-In Hijack Threat -- What Passengers Should Do Next Your New Car Is A Hacker Magnet -- Automotive Industry Disconnect To Blame Organizations must adapt to 'norm' under new data privacy regulations With the increasing value of data, GDPR and California's Consumer Privacy Act of 2018 demonstrate that data privacy policies will continue to be a growing trend in 2019 and beyond. 10 worrisome ransomware predictions for 2019 Best practices for thwarting DNS hijacking attacks Incorporating privacy into data protection strategy The search for key tech talent will get harder and more costly in 2019 Your Next Move: Security operations center analyst C-suite on the line - CyberTalk.org A new phishing campaign specifically targets high- level, c-suite executives to steal their Microsoft Office 365 credentials. A glimpse into the world of counterfeits on the dark web Move over ransomware, cryptojacking is taking the spotlight South African power company gets hit with a cybersecurity double header