El Diario del CISO El Diario del CISO (The CISO Journal) Edición 31 | Page 8
'Narwhal Spider' group's spam campaign targets Japanese recipients with
URLZone malware
#ArmorU poll finds 46% of 37K Twitter users have put sensitive data in cloud
3-year-old jQuery plugin vulnerability finally patched
Agent Tesla author may have been unveiled
Amazon patches IoT and critical infrastructure security flaws
British Airways data breach victim list grows
Cathay Pacific data breach exposes PII of 9.4 million customers
Cyber Command goes on the offense to protect U.S. election
Cybercriminals follow the news too and change tactics accordingly
DDoS and ransomware tools for starter and experienced cybercriminals
exposed
3 top multi-cloud security challenges, and how to build a strategy
FireEye attributes TRITON ICS attack to Russian
Four zero-days found, patched in Arcserve UDP platform
Gandcrab decrypt tools released
ObamaCare portal breach compromises data of 75,000 patients
Report: Pair indicted in Lynda.com breach also responsible for Uber incident
Researchers report vulnerability in Microsoft Word's online video feature
Russia, China listening in on Trump’s private mobile phone conversations,
report
Saudi investment conference website hacked, defaced
Yahoo agrees to $50 million breach settlement, victims eligible for
compensation
The Answer to Cyber Threats: People or Technology?
Tips for CISOs to Maintain Privacy and Reduce Risk as the Use of New
6 takeaways from McAfee MPower
Technology Increases
7 places to find threat intel beyond vulnerability databases
What is application security? A process and tools for securing software
7 unexpected ways GDPR and other privacy regulations make security harder What is Shodan? The search engine for everything on the internet
Burned malware returns, says Cylance report: Is Hacking Team responsible? Burned malware returns, says Cylance report: Is Hacking Team responsible?
Defense, security and the real enemies
Defense, security and the real enemies
FBI: Call of Duty gamers helped steal $3.3 million in cryptocurrency
FBI: Call of Duty gamers helped steal $3.3 million in cryptocurrency
How Microsoft's Controlled Folder Access can help stop ransomware
What is application security? A process and tools for securing software
Know the Facts – Today’s Cyberthreat Landscape
Analysis of North Korea's Internet Traffic Shows a Nation Run Like a Criminal
Recent Branch.io Patch Creates New XSS Flaw
Syndicate
Apple CEO Backs Privacy Laws, Warns Data Being 'Weaponized'
Researchers Find Command Injection Flaw in Cisco WebEx
BA Says 185,000 More Customers Affected in Cyber Attack
Securing the Vote Against Increasing Threats
From Voting to Security Operations, 5 Considerations for Better Decision
Super Micro to Customers: Chinese Spy Chips Story Is Wrong
Making
Magecart Hackers Now Targeting Vulnerable Magento Extensions
To Strengthen Security, Shift Your Focus to Security DevOps
Oracle Adds New Security Services to Cloud Platform
UK Regulator Hits Facebook With Maximum Fine
Overcoming Common SD-WAN Security Mistakes
Yahoo to Pay $50M, Other Costs for Massive Security Breach
Questions Mount Over Delay After Cathay Pacific Admits Huge Data Leak