El Diario del CISO El Diario del CISO (The CISO Journal) Edición 31 | Page 8

'Narwhal Spider' group's spam campaign targets Japanese recipients with URLZone malware #ArmorU poll finds 46% of 37K Twitter users have put sensitive data in cloud 3-year-old jQuery plugin vulnerability finally patched Agent Tesla author may have been unveiled Amazon patches IoT and critical infrastructure security flaws British Airways data breach victim list grows Cathay Pacific data breach exposes PII of 9.4 million customers Cyber Command goes on the offense to protect U.S. election Cybercriminals follow the news too and change tactics accordingly DDoS and ransomware tools for starter and experienced cybercriminals exposed 3 top multi-cloud security challenges, and how to build a strategy FireEye attributes TRITON ICS attack to Russian Four zero-days found, patched in Arcserve UDP platform Gandcrab decrypt tools released ObamaCare portal breach compromises data of 75,000 patients Report: Pair indicted in Lynda.com breach also responsible for Uber incident Researchers report vulnerability in Microsoft Word's online video feature Russia, China listening in on Trump’s private mobile phone conversations, report Saudi investment conference website hacked, defaced Yahoo agrees to $50 million breach settlement, victims eligible for compensation The Answer to Cyber Threats: People or Technology? Tips for CISOs to Maintain Privacy and Reduce Risk as the Use of New 6 takeaways from McAfee MPower Technology Increases 7 places to find threat intel beyond vulnerability databases What is application security? A process and tools for securing software 7 unexpected ways GDPR and other privacy regulations make security harder What is Shodan? The search engine for everything on the internet Burned malware returns, says Cylance report: Is Hacking Team responsible? Burned malware returns, says Cylance report: Is Hacking Team responsible? Defense, security and the real enemies Defense, security and the real enemies FBI: Call of Duty gamers helped steal $3.3 million in cryptocurrency FBI: Call of Duty gamers helped steal $3.3 million in cryptocurrency How Microsoft's Controlled Folder Access can help stop ransomware What is application security? A process and tools for securing software Know the Facts – Today’s Cyberthreat Landscape Analysis of North Korea's Internet Traffic Shows a Nation Run Like a Criminal Recent Branch.io Patch Creates New XSS Flaw Syndicate Apple CEO Backs Privacy Laws, Warns Data Being 'Weaponized' Researchers Find Command Injection Flaw in Cisco WebEx BA Says 185,000 More Customers Affected in Cyber Attack Securing the Vote Against Increasing Threats From Voting to Security Operations, 5 Considerations for Better Decision Super Micro to Customers: Chinese Spy Chips Story Is Wrong Making Magecart Hackers Now Targeting Vulnerable Magento Extensions To Strengthen Security, Shift Your Focus to Security DevOps Oracle Adds New Security Services to Cloud Platform UK Regulator Hits Facebook With Maximum Fine Overcoming Common SD-WAN Security Mistakes Yahoo to Pay $50M, Other Costs for Massive Security Breach Questions Mount Over Delay After Cathay Pacific Admits Huge Data Leak