El Diario del CISO El Diario del CISO (The CISO Journal) Edición 33 | Page 9

‘Tech cos may find it tough to cope with different data laws’ Can't kill innovation, shield corrupt in the name of privacy: Prasad terrorism: Facebook intensifies fight against terrorism, removes 3 mn inappropriate posts Data ownership: Data ownership issues cloud state’s scheme for skills development Cathay Pacific faces probe over massive data breach TheHackersNews Hacker Who DDoSed Sony, EA and Steam Gaming Servers Pleads Guilty Here's How Hackers Could Have Spied On Your DJI Drone Account New Android API Lets Developers Push Updates Within their Apps Popular WooCommerce WordPress Plugin Patches Critical Vulnerability Unpatched VirtualBox Zero-Day Vulnerability and Exploit Released Online Securitynow BLEEDINGBIT' Bluetooth Vulnerability Leaves Enterprises Exposed to Attacks Enterprises Confronting Increasing Volume of Critical Vulnerabilities - Study HSBC Data Breach Shows Failure to Protect Passwords & Access Controls Metamorfo Trojan Revamped to Evade Antivirus Protections New Botnet Infects 100K Routers to Blast Out Spam Welivesecurity Attackers breach web analytics service, go on to target Bitcoin platform Bug bounty program 3.0 launched by US Air Force Cyber insurance: Not the answer that many wish it to be Emotet distributed in a major new large-scale spam campaign Malware of the 1980s: A look back at the Brain Virus and the Morris Worm Databreachtoday Breach Settlement Has Unusual Penalty HSBC Bank Alerts US Customers to Data Breach Ransomware Keeps Ringing in Profits for Cybercrime Rings Techrepublic Cyberattacks increasingly targeting enterprise IT networks in energy and utilities industry Cybertalk Big effort to secure the election and a fallback plan Drone flaw exposes user info, photos, videos, and logs Flaw lets 28K users of spyware see data of other users Hacker impersonated Tesla CEO Musk to promote scam on Twitter Survey says: Consumers don't like data breaches Bankinfosecurity Bankers Life Hack Affects More Than 566,000 Blockchain: The Good, the Bad and the Legal Cracking Down on Criminals' Use of Encrypted Communications Dutch Police Bust 'Cryptophone' Operation Pakistan: Banks Weren’t Hacked, But Card Details Leaked Securityintelligence 3 Creative Strategies to Narrow the Skills Gap A Fun and Educational Answer to the Security Awareness Problem: The Security Escape Room How Business Continuity Management Boosts Value in Security Programs Healthcareinfosecurity Eye Clinic Sees Quick Recovery from Ransomware Attack FDA Reacts to Critique of Medical Device Security Strategy Managing Third-Party Risk in the Age of Ransomware Krebsonsecurity Bug Bounty Hunter Ran ISP Doxing Service