El Diario del CISO El Diario del CISO (The CISO Journal) Edición 4 | Page 5

News1 EL DIARIO DEL CISO (THE CISO JOURNAL) Pensando y Trabajando por un Líder de Seguridad Digital 617 million accounts hacked: Websites exposed, details up for sale and more - ET CISO Data breaches exposed 5 billion records in 2018 | CSO Online A new cyber hack has been reported online in which the details of 617 million users have been compromised. harsher breach notification rules going into effect in ‘Countries must unite against cyber crime’ Adopting preventive measures and risk management tools, the need of the hour: Survey Airbus cyberattack sought intellectual property Careless, unaware employees top vulnerability for rising cyber risk exposure e-commerce policy: Data protection to form core of ecommerce policy Facebook tracking users who threaten its workers: Report Germany to let Nato use its cyber skills Hacker who stole over 600 mn account details strikes again Hackers steal over 600 mn account details from 16 websites Ixigo: Emails, hashed passwords of 18m Ixigo users stolen Jeff Bezos: Jeff Bezos case exposes billionaires' vulnerability to hackers Lack of rules leaves experts puzzled about data ownership after death: Analysis OkCupid users claim account breach, company denies Recovery rate of money in cybercrime abysmal SME: A cyber security incident can be catastrophic for small businesses Top recruiters in 2019 looking for professionals in data science, AI and cyber security ‘Clipper’ malware that alters crypto wallet addresses slips into Play Store - scmagazine.com Google’s Play Store unknowingly hosted a fake cryptocurrency app that actually modifies users’ crypto wallet addresses once they’re copied to the clipboard, researchers are reporting. Coffee Meets Bagel daters credentials among 617M records for sale on Dream Market cyber-souk Details on 617 million user accounts up for sale on dark web Flaw in runC could allow malicious containers to infect host environment Google Play announces 2019 Malicious App Crackdown How your stolen personal data is sent to the dark web, and what hackers can do with it Image-I-Nation supply chain breach exposes data of major credit agencies' customers Not-so-super Mario image hides code that downloads Ursnif trojan 'Old Phantom Crypter' supplants older Microsoft Office exploit builder tools PoC hides malware in Intel SGX enclave Ransomware attackers exploit plug-in flaw to infect MSPs and their clients Report describes Scarlet Widow romance cyber scam The road ahead in cyber TrickBot variant steals credentials for remote computer access VFEmail hit with ‘Catastrophic’ attack that deleted primary and backup files WordPress plugin Simple Social Buttons flaw allows complete site takeover The number of publicly known data breaches decreased last year compared to 2017, despite Europe. 10 essential steps to improve your security posture Attackers place cryptojacking apps in the Microsoft App Store Beware of phony or misleading malware rescue web pages Disastrous cyber attack on email provider wipes US servers and backups Have we doubled the number of women in infosec? How 5 universities stretch security capabilities, budgets with shared SOC How polls are hacked: What every business should know How to identify, prevent and remove rootkits in Windows 10 How to prevent and recover from an APT attack through a managed service provider HP gives software robots their own IDs to audit their activities IBM sets forth with a strong cybersecurity message Popular Xiaomi M365 electric scooters can be remotely hacked What is a man-in-the-middle attack? How MitM attacks work and how to prevent them What is biometrics? And why collecting biometric data is risky Hackers Target WordPress Sites via WP Cost Estimation Plugin | SecurityWeek.Com Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek.He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. China Calls US Concerns Over Huawei 'Groundless' Cryptojacking Applications Land in Microsoft Store Cyber Attack on Malta's Bank of Valletta DHS Cyber Leader Says 2020 Security Preparations Underway Extensive 'Living Off the Land' Hides Stealthy Malware Campaign Germany to Let NATO Use its Cyber Skills Indictment: Hackers Charged With Making Threats to Schools Mozilla, Others Want Big Retailers to Pledge Minimum IoT Security New Variant of Shlayer macOS Malware Discovered Third-Party Patch Released for Code Execution Flaw in OpenOffice U.S. Senators Announce Federal Cybersecurity Workforce Bills Windows App Caught Running on Mac, Installing Malware With Doctored Photos, Thieves Try to Steal Bitcoin The Secret To Comprehensive, Scalable And Effective Cybersecurity Cryptocurrency exchanges are seeing fraudsters submit doctored photos in an attempt to reset two-step verification on accounts. The ruse appears to have some degree Overview of the importance of visibility, context, and scalabiilty for effective cybersecurity and cloud security. Apple Update: Drop Everything and Patch iOS Battling Big Breaches: Are We Getting Better? Cottage Health Hit With $3 Million HIPAA Settlement Japan's Credit Card Fraud Debacle Maximize Cybersecurity Risk Ratings in 2019 No-Deal Brexit Threatens British Crime Fighting Roses Are Red, Romance Scammers Make You Blue SOC-as-a-Service for Financial Institutions Stress Test: Police Visit Webstresser Stresser/Booter Users US Intensifies Pressure on Allies to Avoid Huawei, ZTE WannaCry Hero Loses Key Motions in Hacking Case Are Hackers Winning The Denial Of Service Wars? Cyber Security Risk in Retail and How to Handle It Cybersecurity Mental Health Warning -- 1 In 6 CISOs Now Medicate Or Use Alcohol Don't Buy A Breach: Ten Cybersecurity Red Flags To Look For During M&A Due Diligence From Survive To Thrive In Cybersecurity How CISOs View Their Jobs Silencing Malware with AI Three Things To Know About Cybersecurity In 2019 What I've learned While Training Computers To Predict Cyber Risk WhatsApp Adds Great Account Security Feature, Here's How To Use It