El Diario del CISO El Diario del CISO (The CISO Journal) Edición 5 | Page 10

News2.1 EL DIARIO DEL CISO (THE CISO JOURNAL) Pensando y Trabajando por un Líder de Seguridad Digital #Ransomware, #Trojan and #Miner together against 'PIK-Group 139 US bars, restaurants and coffeeshops infected by credit-card stealing malware 20-year-old pleads guilty to DDoS-for-hire scheme that netted $550,000 2019 RSA Conference Preview: An Insider's Guide to What's Hot 2019 Webroot Threat Report: Forty Percent Of Malicious URLs Found On Good Domains. 450,000 usernames and passwords stolen from Coinmama cryptocurrency broker – HOTforSecurity 5 ways to avoid top malware threats 70000 Pakistani banks’ cards with PINs go on sale on the dark web.Security Affairs A Hacker, I am A New IT Certification for a New IT Mindset A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure An effective cybersecurity strategy for an ICS environment should apply a layered protection Attack Code 'MarioNet' Is Pulling Strings in Your Web Browser Auditing Implications of Blockchain and Cybersecurity Australian government cyberattack: More governments likely to be targeted Big Dump of Pakistani Bank Card Data Appears on Carder Site Bug Allows Bypass of Face ID and Touch ID Authentication of WhatsApp iOS version Businesses Warned of Malware Spread via LinkedIn Job Offers China Abandons Cybersecurity Truce With U.S., Report Says Chips may be inherently vulnerable to Spectre and Meltdown attacks CIO’s guide to boards and tech fluency Coinhive, the in-browser cryptomining service beloved by hackers, is dead Companies Hiring on Basis of Skills Rather Than Open Positions Container Vulnerability: Still a Reality Critical Remote Code Execution Flaw Discovered in Wordpress Critical Remote Execution Flaw Discovered in WinRAR Impacting all Versions Cyber Attackers Utilizing Common Methodologies in Different Industries Cybersecurity Startup Armorblox Raises $16.5M, Launches Out Of Stealth Cybersecurity threats to US infrastructure warrant 'moonshot' response Data as an asset Iranian Hackers Drew Worryingly Close to Israel's Missile Alarm Is Bad Cyber Insurance Coverage Actually Good for Consumers? IT Security Vulnerability Roundup – February 2019 It's time to rethink our approach to cybersecurity training Jenkins Master Post Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Research Blog Kaspersky Lab And ThreatConnect Collaborate To Help Customers Get A Complete Picture Of The Threat Landscape. Latest In Cyber Security News Part 2: Where’s The Equifax Data? LinkedIn Messaging Abused to Target US Companies With Backdoors List of data breaches and cyber attacks in February 2019 - 692,853,046 records leaked Malware attacks Pornhub users accounts for their credentials Maximizing the data lake investment McAfee Mobile Threat Report Unveils 550% Increase in Consumer Security Risks Connected to Fake and Malicious Apps in Second Half of 2018 Measuring Up for Cybersecurity: Some Thoughts Just Before RSA San Francisco 2019 Microsoft warns of hacker 'attacks' on EU elections New batch of 127 Million Stolen Records was found for Sale on Dark Web New Malspam Campaign Targets WinRAR ACE Flaw to Deliver Malware Organizations Face Cyber Threats Big and Small: Research Phishing Campaign Spoofs United Nations and Multiple Other Organizations Phishing Campaign Spoofs United Nations and Multiple Other Organizations Plain wrong: Millions of utility customers’ passwords stored in plain text Police Push Free Decryptor for GandCrab Ransomware Post-Breach HIPAA Enforcement: A Call for ‘Safe Harbors’ Qbot malware's back, and latest strain relies on Visual Basic script to slip into target machines Ransomware Pretends to Be Proton Security Team Securing Data From Hackers Recapping IBM Think 2019 and HIMSS19 Red Hat Security Advisory 2019-0415-01 Reducing Your Legal Exposure After a Cybersecurity Incident Running Elasticsearch 1.4.2 or earlier? There's targeted malware going for your boxen Russia - Fastest State Threat in the World SamSam and Mitre ATT&CK Data Privacy and Security – Largest Health Data Breach of 2019 Strikes Seattle Hospital DNC issues new cybersecurity guidance to Democrats as 2020 races approach: Report DNC updates cybersecurity checklist Dow Jones’ watchlist of 2.4 million high-risk individuals has leaked Driving A Cyber Security Culture Into The Business Europe is prepared to rule over 5G cybersecurity Five of the Top Bug Bounty Platforms Follow the Leaders: 7 Tips to Get the Most Out of Your Security Analytics Four reasons not to blame the CISOs GandCrab Ransomware Affiliates Continue to Push Decryptable Versions Geopolitics: An Overlooked Influencer in Cyber Operations German authorities warn of malware in tablets and smartphones Hacker Sells 620 Million Customer Details on Dark Web for $20k in Bitcoin – HOTforSecurity Hacker steals $7.7 million in EOS cryptocurrency after blacklist snafu Hackers 'scramble' patient files in Melbourne heart clinic cyber attack Hackers ‘scramble’ Patient files in Melbourne heart clinic cyber attack cybersecurity – Cengiz Adabag Hackers abuse LinkedIn DMs to plant malware Hackers getting stealthier, report finds HIPAA Data Breach Reports Due to OCR by 2/28/19 How Can CISOs Improve Board Governance Around Cyber Risk Management? How cybersecurity can expose issuer vulnerabilities How executive vacancies hinder IT modernization and cybersecurity How to combat burnout in cybersecurity How to Think About Cybersecurity Differently Incident Of The Week: UConn Health Phishing Attack Exposes Patient Data Incident Of The Week: UW Medicine Patient Data Exposed Online Infographic on the EU Cybersecurity Act certification framework Insider Threats: A CISO's Guide International law cannot keep up with cyber-criminals Iran-backed hackers hit both U.K., Australian parliaments, says report Security Control Gaps Are Not Risks Singapore moots inclusion of data portability in data protection law Supply Chain Attacks Increase 78% Supply Chain Attacks Spiked 78 Percent in 2018, Cyber Researchers Found Suspected State-Sponsored Hackers Pummel US and Australia The Cybersecurity 202: This nonprofit has a plan to dramatically improve the weakest cybersecurity link The mental health of CISOs is suffering The Navy’s vision in a new era of information warfare The Rise of the Cyber Industrial Complex The Status of Cybersecurity in Italy and the Influence of Cyberspace on the International System's Stability, Peace and Security The week in security: Cybercriminals celebrate NDB’s first anniversary with... more breaches This Week in Security News: Instagram Hackers and Enterprise Threats This Week in Security News: Malware and Machine Learning Tomorrow’s Data Heroes Top 6 Countries with the Best Cyber Security Measures Toyota Australia driven offline by cyber attack, as heart hospital hit by ransomware Two cybersecurity myths you need to forget right now, if you want to stop the hackers Two weeks after hackers tried to steal 13 million euros, Bank of Valletta goes offline again UConn Health Says Data Breach Could Impact More Than 300,000 UN aviation agency concealed serious hack: media Vulnerability exposes location of thousands of malware C&C servers Warner questions health care groups on cybersecurity Weak Human Link Still Main Enterprise Security Concern What the Heck Is a Security Awareness Strategy? Why Is It So Hard To Break Into The Field Of Cybersecurity? Why Many Organizations Still Don't Understand Security Will Huawei Take Down The Five Eye Alliance? Women in tech: Two prominent female security experts speak out (CxOTalk interview)