El Diario del CISO El Diario del CISO (The CISO Journal) Edición 5 | Page 10
News2.1
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Pensando y Trabajando por
un Líder de Seguridad Digital
#Ransomware, #Trojan and #Miner together against 'PIK-Group
139 US bars, restaurants and coffeeshops infected by credit-card stealing malware
20-year-old pleads guilty to DDoS-for-hire scheme that netted $550,000
2019 RSA Conference Preview: An Insider's Guide to What's Hot
2019 Webroot Threat Report: Forty Percent Of Malicious URLs Found On Good Domains.
450,000 usernames and passwords stolen from Coinmama cryptocurrency broker –
HOTforSecurity
5 ways to avoid top malware threats
70000 Pakistani banks’ cards with PINs go on sale on the dark web.Security Affairs
A Hacker, I am
A New IT Certification for a New IT Mindset
A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure
An effective cybersecurity strategy for an ICS environment should apply a layered
protection
Attack Code 'MarioNet' Is Pulling Strings in Your Web Browser
Auditing Implications of Blockchain and Cybersecurity
Australian government cyberattack: More governments likely to be targeted
Big Dump of Pakistani Bank Card Data Appears on Carder Site
Bug Allows Bypass of Face ID and Touch ID Authentication of WhatsApp iOS version
Businesses Warned of Malware Spread via LinkedIn Job Offers
China Abandons Cybersecurity Truce With U.S., Report Says
Chips may be inherently vulnerable to Spectre and Meltdown attacks
CIO’s guide to boards and tech fluency
Coinhive, the in-browser cryptomining service beloved by hackers, is dead
Companies Hiring on Basis of Skills Rather Than Open Positions
Container Vulnerability: Still a Reality
Critical Remote Code Execution Flaw Discovered in Wordpress
Critical Remote Execution Flaw Discovered in WinRAR Impacting all Versions
Cyber Attackers Utilizing Common Methodologies in Different Industries
Cybersecurity Startup Armorblox Raises $16.5M, Launches Out Of Stealth
Cybersecurity threats to US infrastructure warrant 'moonshot' response
Data as an asset
Iranian Hackers Drew Worryingly Close to Israel's Missile Alarm
Is Bad Cyber Insurance Coverage Actually Good for Consumers?
IT Security Vulnerability Roundup – February 2019
It's time to rethink our approach to cybersecurity training
Jenkins Master Post Carnal0wnage - Attack Research Blog Carnal0wnage & Attack
Research Blog
Kaspersky Lab And ThreatConnect Collaborate To Help Customers Get A Complete
Picture Of The Threat Landscape.
Latest In Cyber Security News Part 2: Where’s The Equifax Data?
LinkedIn Messaging Abused to Target US Companies With Backdoors
List of data breaches and cyber attacks in February 2019 - 692,853,046 records
leaked
Malware attacks Pornhub users accounts for their credentials
Maximizing the data lake investment
McAfee Mobile Threat Report Unveils 550% Increase in Consumer Security Risks
Connected to Fake and Malicious Apps in Second Half of 2018
Measuring Up for Cybersecurity: Some Thoughts Just Before RSA San Francisco 2019
Microsoft warns of hacker 'attacks' on EU elections
New batch of 127 Million Stolen Records was found for Sale on Dark Web
New Malspam Campaign Targets WinRAR ACE Flaw to Deliver Malware
Organizations Face Cyber Threats Big and Small: Research
Phishing Campaign Spoofs United Nations and Multiple Other Organizations
Phishing Campaign Spoofs United Nations and Multiple Other Organizations
Plain wrong: Millions of utility customers’ passwords stored in plain text
Police Push Free Decryptor for GandCrab Ransomware
Post-Breach HIPAA Enforcement: A Call for ‘Safe Harbors’
Qbot malware's back, and latest strain relies on Visual Basic script to slip into target
machines
Ransomware Pretends to Be Proton Security Team Securing Data From Hackers
Recapping IBM Think 2019 and HIMSS19
Red Hat Security Advisory 2019-0415-01
Reducing Your Legal Exposure After a Cybersecurity Incident
Running Elasticsearch 1.4.2 or earlier? There's targeted malware going for your
boxen
Russia - Fastest State Threat in the World
SamSam and Mitre ATT&CK
Data Privacy and Security – Largest Health Data Breach of 2019
Strikes Seattle Hospital
DNC issues new cybersecurity guidance to Democrats as 2020 races
approach: Report
DNC updates cybersecurity checklist
Dow Jones’ watchlist of 2.4 million high-risk individuals has leaked
Driving A Cyber Security Culture Into The Business
Europe is prepared to rule over 5G cybersecurity
Five of the Top Bug Bounty Platforms
Follow the Leaders: 7 Tips to Get the Most Out of Your Security
Analytics
Four reasons not to blame the CISOs
GandCrab Ransomware Affiliates Continue to Push Decryptable
Versions
Geopolitics: An Overlooked Influencer in Cyber Operations
German authorities warn of malware in tablets and smartphones
Hacker Sells 620 Million Customer Details on Dark Web for $20k in
Bitcoin – HOTforSecurity
Hacker steals $7.7 million in EOS cryptocurrency after blacklist snafu
Hackers 'scramble' patient files in Melbourne heart clinic cyber attack
Hackers ‘scramble’ Patient files in Melbourne heart clinic cyber attack
cybersecurity – Cengiz Adabag
Hackers abuse LinkedIn DMs to plant malware
Hackers getting stealthier, report finds
HIPAA Data Breach Reports Due to OCR by 2/28/19
How Can CISOs Improve Board Governance Around Cyber Risk
Management?
How cybersecurity can expose issuer vulnerabilities
How executive vacancies hinder IT modernization and cybersecurity
How to combat burnout in cybersecurity
How to Think About Cybersecurity Differently
Incident Of The Week: UConn Health Phishing Attack Exposes Patient
Data
Incident Of The Week: UW Medicine Patient Data Exposed Online
Infographic on the EU Cybersecurity Act certification framework
Insider Threats: A CISO's Guide
International law cannot keep up with cyber-criminals
Iran-backed hackers hit both U.K., Australian parliaments, says report
Security Control Gaps Are Not Risks
Singapore moots inclusion of data portability in data protection law
Supply Chain Attacks Increase 78%
Supply Chain Attacks Spiked 78 Percent in 2018, Cyber Researchers Found
Suspected State-Sponsored Hackers Pummel US and Australia
The Cybersecurity 202: This nonprofit has a plan to dramatically improve the
weakest cybersecurity link
The mental health of CISOs is suffering
The Navy’s vision in a new era of information warfare
The Rise of the Cyber Industrial Complex
The Status of Cybersecurity in Italy and the Influence of Cyberspace on the
International System's Stability, Peace and Security
The week in security: Cybercriminals celebrate NDB’s first anniversary with...
more breaches
This Week in Security News: Instagram Hackers and Enterprise Threats
This Week in Security News: Malware and Machine Learning
Tomorrow’s Data Heroes
Top 6 Countries with the Best Cyber Security Measures
Toyota Australia driven offline by cyber attack, as heart hospital hit by
ransomware
Two cybersecurity myths you need to forget right now, if you want to stop the
hackers
Two weeks after hackers tried to steal 13 million euros, Bank of Valletta goes
offline again
UConn Health Says Data Breach Could Impact More Than 300,000
UN aviation agency concealed serious hack: media
Vulnerability exposes location of thousands of malware C&C servers
Warner questions health care groups on cybersecurity
Weak Human Link Still Main Enterprise Security Concern
What the Heck Is a Security Awareness Strategy?
Why Is It So Hard To Break Into The Field Of Cybersecurity?
Why Many Organizations Still Don't Understand Security
Will Huawei Take Down The Five Eye Alliance?
Women in tech: Two prominent female security experts speak out (CxOTalk
interview)