El Diario del CISO El Diario del CISO (The CISO Journal) Edición 32 | Page 9
Cybersecurity professional impressions on cloud-native security
Accused CIA Leaker Faces New Charges of Leaking Information From Prison
Apple's New MacBook Disconnects Microphone "Physically" When Lid is
Closed
IBM Buys "Red Hat" Open-Source Software Company for $34 Billion
New Intel CPU Flaw Exploits Hyper-Threading to Steal Encrypted Data
New iPhone Passcode Bypass Found Hours After Apple Releases iOS 12.1
Securereading
Reports: Indian Customers Financial Data Shared with US Intel
Eurostar Confirms a Data Breach in their Systems
Flaw in Systemd could Crash Linux Systems
New Attack Technique uses Microsoft Word and Youtube Videos to Deliver
Malware
New BleedingBit Flaws in Bluetooth Chips Affects Millions of Devices
Private Messages of 81,000 Facebook User Accounts Discovered for Sale
Recent Cyber Attacks 2018
Bankinfosecurity
Australian Shipbuilder Hacked, Refuses to Pay Ransom
Canada's Mandatory Breach Notification Rules Now in Effect
Managing Cyber Risks: A New Tool for Banks
Mirai Co-Author Gets House Arrest, $8.6 Million Fine
Radisson Suffers Global Loyalty Program Data Breach
Satori Botnet's Alleged Developer Rearrested
Thousands of critical energy and water systems exposed online for anyone to
exploit
Signal Secure Messaging App Now Encrypts Sender's Identity As Well
Two New Bluetooth Chip Flaws Expose Millions of Devices to Remote Attacks
Unpatched MS Word Flaw Could Allow Hackers to Infect Your Computer
Windows 10 Bug Let UWP Apps Access All Files Without Users' Consent
Threatpost
Facebook Blames Malicious Extensions in Breach of 81K Private Messages
GDPR's First 150 Days Impact on the U.S.
PoC Exploit Compromises Microsoft Live Accounts via Subdomain Hijacking
ThreatList: Fewer Big DDoS Attacks in Q3, Overall Rate Holds Steady
Two Zero-Day Bugs Open Millions of Wireless Access Points to Attack
Utilities, Energy Sector Attacked Mainly Via IT, Not ICS
Yi IoT Home Camera Riddled with Code-Execution Vulnerabilities
Forbes
Expert Warns That This Common Cyber-Attack Could Hit The Midterm
Elections
Getting Back To Basics With Cybersecurity
How Traditional Training Is Weakening Businesses' Cybersecurity
Iranian Hackers Hit U.K. Cybersecurity Universities
The Cybersecurity Maturity Model: A Means To Measure And Improve Your
Cybersecurity Program
What Dr. Seuss Can Teach Us About Bringing Cybersecurity Onto The
Blockchain
Sextortion Scam Wields Stolen Passwords, Demands Bitcoins
Securitymagazine
5 Components to a Proactive Security Strategy
Clear, Purge & Destroy: When Data Must be Eliminated, Part 2
Four Years in Europe: Lessons in Cybersecurity
Cybertalk
Aerospace secrets stolen by Chinese hackers
Beware the USB device: A weapon for cyberattack
Cybersecurity thought leadership for executives: news, trends, and insights