El Diario del CISO El Diario del CISO (The CISO Journal) Edición 33 | Page 8
HSBC Security Incident - Customer Details Exposed
Landline’s Loss Is Mobile’s Making
Magecart Claims Kitronik As Another Victim
Inception Attackers Combine Old Exploit and New Backdoor
Addressing the 3 Million Person Cybersecurity Workforce Gap
Apache Struts Users Told to Update Vulnerable Component
China Telecom Constantly Misdirects Internet Traffic
Getting ROI From a Security Advisory Board That Works: Part 1 - Why
Evernote Flaw Allows Hackers to Steal Files, Execute Commands
Flaws in Roche Medical Devices Can Put Patients at Risk
U.S. Government Publishes New Insider Threat Program Maturity
Framework
8 features a cybersecurity technology platform must have
Automating security at AWS: How Amazon Web Services operates with no
SOC
Critical authentication flaw in DJI drone web app fixed
Cyber security relics: 4 older technologies still plaguing the infosec world
Data exchanges know all about you; soon they'll impact cybersecurity
Doctored Jim Acosta video shows why fakes don’t need to be deep to be
dangerous
Experience an RDP attack? It’s your fault, not Microsoft’s
Embracing the Cybersecurity ‘Grey Space’
HSBC Data Breach Hits Online Banking Customers
Lawsuits Aim Billions in Fines at Equifax and Ad-Targeting Companies
Newsmaker Interview: Tom Kellermann on Hacking the Midterm Elections
Pentagon Draws Back the Veil on APT Malware with Sudden Embrace of
VirusTotal
Passwords: Here to Stay, Despite Smart Alternatives?
VirtualBox Zeroday
Why Managing Your IT Inventory Is Vital To Staying Cyber Safe
Google Wants More Projects Integrated With OSS-Fuzz
HSBC Bank USA Warns Customers of Data Breach
Intelligence is Not a Numbers Game
Man Behind DDoS Attacks on Gaming Companies Pleads Guilty
New Side-Channel Vulnerability Leaks Sensitive Data From Intel Chips
Prioritizing Flaws Based on Severity Increasingly Ineffective: Study
Securing Connected Cars: How to Create a Cost-Effective, Secure In-Vehicle
Network Backbone
Remember: It’s not all about the 1s and 0s
The Need for a Unified Security Strategy for Converging IT/OT Environments
The OPM hack explained: Bad security practices meet China's Captain
America
Up-Close Look at Threat Response in 2 Industries
What are deepfakes? How and why they work
Learn to play defense by hacking these broken web apps
Worst malware and threat actors of 2018 so far
PortSmash Side Channel Attack Siphons Data From Intel, Other CPUs
Rapidly Growing Router Botnet Takes Advantage of 5-Year-Old Flaw
Recently-Patched Adobe ColdFusion Flaw Exploited By APT
Samsung, Crucial’s Flawed Storage Drive Encryption Leaves Data Exposed
Threatpost News Wrap Podcast for Nov. 9
U.S. Elections True Test for Facebook’s Disinformation Crackdown