El Diario del CISO El Diario del CISO (The CISO Journal) Edición 4 | Página 6
News2
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Pensando y Trabajando por
un Líder de Seguridad Digital
Thehackernews
Adobe Releases February 2019 Patch Updates For 75 Vulnerabilities
Ex-US Intelligence Agent Charged With Spying and Helping Iranian Hackers
Hacker Breaches Dozens of Sites, Puts 127 Million New Records Up for Sale
Hackers Destroyed VFEmail Service – Deleted Its Entire Data and Backups
Microsoft Patch Tuesday — February 2019 Update Fixes 77 Flaws
New Unpatched macOS Flaw Lets Apps Spy On Your Safari Browsing History
Researchers Implant "Protected" Malware On Intel SGX Enclaves
Snapd Flaw Lets Attackers Gain Root Access On Linux Systems
WARNING – New Phishing Attack That Even Most Vigilant Users Could Fall For
Threatpost
Data Breach Bonanza: Dating Apps, Equifax, Mass Credential Dumps
Eight Cryptojacking Apps Booted From Microsoft Store
Ever-Changing Emotet Evolves Again with Fresh Evasion Tactic
Threatpost Poll: Over Half of Firms Asked Struggle with Mobile Security
Tips on How to Fight Back Against DNS Spoofing Attacks
Where's the Equifax Data? Does It Matter?
Welivesecurity
Attack at email provider wipes out almost
two decades’ worth of data
Bank of Valetta resumes operations after
cyberheist-induced shutdown
When love becomes a nightmare: Online
dating scams
Why you should choose a pseudonym at
Starbucks
Securitynow
Botched Mumsnet update allowed
users to see details of strangers'
accounts
Smashing Security #115: Love,
Nests, and is 2FA destroying the
world?
Some OkCupid users have their
accounts compromised. Why don't
more dating apps use 2FA?
VFEmail suffers 'catastrophic'
attack, as hacker wipes email
service's primary and backup data
ITspmagazine
Securitymagazine
Are We Investing In InfoSec To Solve
Problems Or Make Money?
Prevention Is Always Better Than Reaction
When It Comes To Safety. Cybersecurity Is
No Different, But What To Do If You Become
A Victim Of Cybercrime?
Snake Oil or Silver Bullet? Blockchains Are
Neither
Zdnet
Adobe’s massive patch update fixes critical Acrobat, Reader bugs
Doomsday Docker security hole uncovered
Error: Page Not found
Malvertising campaign hits US users hard over Presidents' Day weekend
POS firm says hackers planted malware on customer networks
Two cybersecurity myths you need to forget right now, if you want to stop
the hackers
Grahamcluley
8 Cybersecurity Risks That May
Impact Organizations in 2019
80 Percent of U.S. Businesses
Expect a Critical Breach in 2019
Departing the Profession: Why
Infosec Burnout is a Bigger Deal
Than We Think
Other news
$31.82 Bn MEA Cybersecurity Market - Forecast to 2023
122 K-12 cybersecurity threats reported last year
7 Security Tips for Online Business Owners
A Road Map for CISOs
AI, DL: salvation or demise for cybersecurity?
Another flaw found in macOS Mojave’s privacy protection
CISO Burnout is Real: Nominet Survey Exposes Soaring CISO Stress
Correctly Understanding the Cyber Security Triads
CrowdStrike: Nation-state cyber operations gaining steam -- FCW
Cyber attack on Malta bank tried to transfer cash abroad
Increased Cryptomining: a Toehold for Attackers
Lessons Learned From 2018 Security Breaches
Six Large Data Dumps Add Fuel to Collection #1's Fire
The Rise of 'Fileless' Malware
What You Need to Know About Arbitrary Code Execution Vulnerabilities
Cyware
ATM-jackpotting WinPot malware now features a slot machine interface
Critical vulnerabilities spotted in the Amtrak mobile application
Dunn Brothers, Chino Latino and other Minnesota businesses hit by data
breach
Mississippi hospital struck by phishing attack exposing data of nearly 30,000
patients
White hats flooded VKontakte social media network with a spam campaign as
a part of a revenge prank
Lawjournalnewsletter
‘Dark Overlord’ Hack Shows Mounting Cyber Risks for Law Firms
2019 Trends Overview: Compliance, Privacy and Security Family Tree
Causation and Harm In Data Breach Litigation
Implications of GDPR & CCPA on Public Records
Legal Operations Chiefs Say Managing Technology and Cutting Costs Are Main
Priorities, Not Blockchain or AI
Cybertalk
Critical resources at risk across the globe due to cyberattacks
Hackers know how to show the love on Valentine's Day
Leaking of Bezos' personal data suggests cybersecurity weakness
Pitfalls and Progress: Cyber Security in the Education Sector
VFEmail knocked out by hackers - calls it 'catastrophic'
Cyber Security Compliance Requirements Deadline March 1st, 2019
Cybersecurity and the C-Suite: What Executives Need to Know
Cybersecurity for marketers: Teamwork is key to protect data
Dependencies: It's not just your code you need to secure.
Future-of-IT-Audit-Position-Paper_mis_Eng_0818.pdf
Hard-to-detect credential-theft malware has infected 1,200 and is still going
HIMSS 2019: Cybersecurity Is a War — Here’s How Providers Can Fight Back
How Adaptive Cyber Security Can Enable Digital Health Adoption
How could Bashe-style ransomware threats impact cyber insurance?
How to prevent IoT hacks: Focus on security, not features
How your stolen personal data is sent to the dark web, and what hackers can do with it
InfoSec Institute's Top Podcasts to Take Your Computer Skills to the Next Level
Intermountain CISO West: Cybersecurity for revenue cycle should be a KPI
Investment Property for Sale UK
Major Flaw in Runc Poses Mass Container Takeover Risk
Most Companies Are Confident in Their Compliance Controls: eSecurity Planet Survey
Neobanks face cyber security struggle to match big banks
New Malware Kills Rival Miners Upon Installation
Old Phantom Crypter upends malicious document tools – Sophos News
Russian hackers targeted US think tanks in Europe
Russian to shut down Internet to test its cyber deterrence
Special Report: Cybersecurity
Texas AG: Business Must Implement and Maintain Reasonable Cybersecurity Safeguards
The week in security: With breaches soaring, is cybersecurity just minutes to midnight?
These Are the Countries With the Best and Worst CybersecuritySecurity Affairs
Trend Micro Survey Finds 80 Percent of U.S. Businesses Expect a Critical Breach in 2019
Understanding and Implementing
US Air Force Veteran Charged in Iran Hacking Scheme
WhatsApp vulnerability discovered that lets you bypass Face ID or Touch ID security feature
Where cybersecurity legislation 'goes to die' in Congress
Why Building a Security First Culture is Business-Critical
Why cybersecurity education matters
Why Visibility is Critical to Protecting Machine Identities. An Interview with CISO John Graham
Working Within a New Cyber Framework » Posts
www.cisos.club
[email protected]