El Diario del CISO El Diario del CISO (The CISO Journal) Edición 33 | Page 8

HSBC Security Incident - Customer Details Exposed Landline’s Loss Is Mobile’s Making Magecart Claims Kitronik As Another Victim Inception Attackers Combine Old Exploit and New Backdoor Addressing the 3 Million Person Cybersecurity Workforce Gap Apache Struts Users Told to Update Vulnerable Component China Telecom Constantly Misdirects Internet Traffic Getting ROI From a Security Advisory Board That Works: Part 1 - Why Evernote Flaw Allows Hackers to Steal Files, Execute Commands Flaws in Roche Medical Devices Can Put Patients at Risk U.S. Government Publishes New Insider Threat Program Maturity Framework 8 features a cybersecurity technology platform must have Automating security at AWS: How Amazon Web Services operates with no SOC Critical authentication flaw in DJI drone web app fixed Cyber security relics: 4 older technologies still plaguing the infosec world Data exchanges know all about you; soon they'll impact cybersecurity Doctored Jim Acosta video shows why fakes don’t need to be deep to be dangerous Experience an RDP attack? It’s your fault, not Microsoft’s Embracing the Cybersecurity ‘Grey Space’ HSBC Data Breach Hits Online Banking Customers Lawsuits Aim Billions in Fines at Equifax and Ad-Targeting Companies Newsmaker Interview: Tom Kellermann on Hacking the Midterm Elections Pentagon Draws Back the Veil on APT Malware with Sudden Embrace of VirusTotal Passwords: Here to Stay, Despite Smart Alternatives? VirtualBox Zeroday Why Managing Your IT Inventory Is Vital To Staying Cyber Safe Google Wants More Projects Integrated With OSS-Fuzz HSBC Bank USA Warns Customers of Data Breach Intelligence is Not a Numbers Game Man Behind DDoS Attacks on Gaming Companies Pleads Guilty New Side-Channel Vulnerability Leaks Sensitive Data From Intel Chips Prioritizing Flaws Based on Severity Increasingly Ineffective: Study Securing Connected Cars: How to Create a Cost-Effective, Secure In-Vehicle Network Backbone Remember: It’s not all about the 1s and 0s The Need for a Unified Security Strategy for Converging IT/OT Environments The OPM hack explained: Bad security practices meet China's Captain America Up-Close Look at Threat Response in 2 Industries What are deepfakes? How and why they work Learn to play defense by hacking these broken web apps Worst malware and threat actors of 2018 so far PortSmash Side Channel Attack Siphons Data From Intel, Other CPUs Rapidly Growing Router Botnet Takes Advantage of 5-Year-Old Flaw Recently-Patched Adobe ColdFusion Flaw Exploited By APT Samsung, Crucial’s Flawed Storage Drive Encryption Leaves Data Exposed Threatpost News Wrap Podcast for Nov. 9 U.S. Elections True Test for Facebook’s Disinformation Crackdown