El Diario del CISO El Diario del CISO (The CISO Journal) Edición 33 | Page 9
‘Tech cos may find it tough to cope with different data laws’
Can't kill innovation, shield corrupt in the name of privacy: Prasad
terrorism: Facebook intensifies fight against terrorism, removes 3 mn
inappropriate posts
Data ownership: Data ownership issues cloud state’s scheme for skills
development
Cathay Pacific faces probe over massive data breach
TheHackersNews
Hacker Who DDoSed Sony, EA and Steam Gaming Servers Pleads Guilty
Here's How Hackers Could Have Spied On Your DJI Drone Account
New Android API Lets Developers Push Updates Within their Apps
Popular WooCommerce WordPress Plugin Patches Critical Vulnerability
Unpatched VirtualBox Zero-Day Vulnerability and Exploit Released Online
Securitynow
BLEEDINGBIT' Bluetooth Vulnerability Leaves Enterprises Exposed to Attacks
Enterprises Confronting Increasing Volume of Critical Vulnerabilities - Study
HSBC Data Breach Shows Failure to Protect Passwords & Access Controls
Metamorfo Trojan Revamped to Evade Antivirus Protections
New Botnet Infects 100K Routers to Blast Out Spam
Welivesecurity
Attackers breach web analytics service, go on to target Bitcoin platform
Bug bounty program 3.0 launched by US Air Force
Cyber insurance: Not the answer that many wish it to be
Emotet distributed in a major new large-scale spam campaign
Malware of the 1980s: A look back at the Brain Virus and the Morris Worm
Databreachtoday
Breach Settlement Has Unusual Penalty
HSBC Bank Alerts US Customers to Data Breach
Ransomware Keeps Ringing in Profits for Cybercrime Rings
Techrepublic
Cyberattacks increasingly targeting enterprise IT networks in energy and
utilities industry
Cybertalk
Big effort to secure the election and a fallback plan
Drone flaw exposes user info, photos, videos, and logs
Flaw lets 28K users of spyware see data of other users
Hacker impersonated Tesla CEO Musk to promote scam on Twitter
Survey says: Consumers don't like data breaches
Bankinfosecurity
Bankers Life Hack Affects More Than 566,000
Blockchain: The Good, the Bad and the Legal
Cracking Down on Criminals' Use of Encrypted Communications
Dutch Police Bust 'Cryptophone' Operation
Pakistan: Banks Weren’t Hacked, But Card Details Leaked
Securityintelligence
3 Creative Strategies to Narrow the Skills Gap
A Fun and Educational Answer to the Security Awareness Problem: The
Security Escape Room
How Business Continuity Management Boosts Value in Security Programs
Healthcareinfosecurity
Eye Clinic Sees Quick Recovery from Ransomware Attack
FDA Reacts to Critique of Medical Device Security Strategy
Managing Third-Party Risk in the Age of Ransomware
Krebsonsecurity
Bug Bounty Hunter Ran ISP Doxing Service