El Diario del CISO El Diario del CISO (The CISO Journal) Edición 32 | Page 9

Cybersecurity professional impressions on cloud-native security Accused CIA Leaker Faces New Charges of Leaking Information From Prison Apple's New MacBook Disconnects Microphone "Physically" When Lid is Closed IBM Buys "Red Hat" Open-Source Software Company for $34 Billion New Intel CPU Flaw Exploits Hyper-Threading to Steal Encrypted Data New iPhone Passcode Bypass Found Hours After Apple Releases iOS 12.1 Securereading Reports: Indian Customers Financial Data Shared with US Intel Eurostar Confirms a Data Breach in their Systems Flaw in Systemd could Crash Linux Systems New Attack Technique uses Microsoft Word and Youtube Videos to Deliver Malware New BleedingBit Flaws in Bluetooth Chips Affects Millions of Devices Private Messages of 81,000 Facebook User Accounts Discovered for Sale Recent Cyber Attacks 2018 Bankinfosecurity Australian Shipbuilder Hacked, Refuses to Pay Ransom Canada's Mandatory Breach Notification Rules Now in Effect Managing Cyber Risks: A New Tool for Banks Mirai Co-Author Gets House Arrest, $8.6 Million Fine Radisson Suffers Global Loyalty Program Data Breach Satori Botnet's Alleged Developer Rearrested Thousands of critical energy and water systems exposed online for anyone to exploit Signal Secure Messaging App Now Encrypts Sender's Identity As Well Two New Bluetooth Chip Flaws Expose Millions of Devices to Remote Attacks Unpatched MS Word Flaw Could Allow Hackers to Infect Your Computer Windows 10 Bug Let UWP Apps Access All Files Without Users' Consent Threatpost Facebook Blames Malicious Extensions in Breach of 81K Private Messages GDPR's First 150 Days Impact on the U.S. PoC Exploit Compromises Microsoft Live Accounts via Subdomain Hijacking ThreatList: Fewer Big DDoS Attacks in Q3, Overall Rate Holds Steady Two Zero-Day Bugs Open Millions of Wireless Access Points to Attack Utilities, Energy Sector Attacked Mainly Via IT, Not ICS Yi IoT Home Camera Riddled with Code-Execution Vulnerabilities Forbes Expert Warns That This Common Cyber-Attack Could Hit The Midterm Elections Getting Back To Basics With Cybersecurity How Traditional Training Is Weakening Businesses' Cybersecurity Iranian Hackers Hit U.K. Cybersecurity Universities The Cybersecurity Maturity Model: A Means To Measure And Improve Your Cybersecurity Program What Dr. Seuss Can Teach Us About Bringing Cybersecurity Onto The Blockchain Sextortion Scam Wields Stolen Passwords, Demands Bitcoins Securitymagazine 5 Components to a Proactive Security Strategy Clear, Purge & Destroy: When Data Must be Eliminated, Part 2 Four Years in Europe: Lessons in Cybersecurity Cybertalk Aerospace secrets stolen by Chinese hackers Beware the USB device: A weapon for cyberattack Cybersecurity thought leadership for executives: news, trends, and insights