El Diario del CISO El Diario del CISO (The CISO Journal) Edición 5 | Page 6
News0
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Pensando y Trabajando por
un Líder de Seguridad Digital
International InfoSec & Cybersecurity News
500 million WinRAR users open to
compromise via a 19-year-old flaw -
Help Net Security Russian State Hackers Take Minutes to
Move Laterally - Infosecurity Magazine
A vulnerability affecting all versions of the WinRAR file
archiver utility could be exploited to deliver malware
via specially crafted ACE archives. operationally effective, according to the latest report
40% of malicious URLs were found
on good domains - Help Net Security Australian PM Blames “Sophisticated
State Actor” for Parliament Hack -
Infosecurity Magazine
While tried-and-true attack methods are still going
strong
(ISC)² Secure Summit EMEA will welcome hundreds of the best minds in
cybersecurity
2018 saw 6,515 reported breaches, exposing 5 billion sensitive records
74% of organizations face outages due to expired certificates
92% of organizations rank users as their primary security concern
Attackers continue to enhance their performance, apply smart business
techniques
Businesses need to rethink security priorities due to shifting trends
By 2025 workforce most likely to consist of humans and bots
Cisco SOHO wireless VPN firewalls and routers open to attack
CISO's guide to an effective post-incident board report
Consumer attitudes towards security breaches are changing significantly
Criminal groups promising salaries averaging $360,000 per year to accomplices
Detecting Trojan attacks against deep neural networks
ENISA provides recommendations to improve the cybersecurity of EU electoral
processes
Enterprises are blind to over half of malware sent to their employees
European standards org releases consumer IoT cybersecurity standard
Exposure of sensitive data via cloud applications and services increases 20%
Formjacking is the new get rich quick scheme for cybercriminals
Free decryption tool could save victims millions in ransomware payments
Global mobile networks to support 12.3 billion devices and IoT connections by
2022
Half of business leaders say a breach could end their business, others remain
unaware
Healthcare industry: Key trends and cybersecurity challenges
Highly critical Drupal RCE flaw could lead to new Drupalgeddon, patch now!
How are businesses facing the cybersecurity challenges of increasing cloud
adoption?
How to combat delivery ramifications after a data breach
ICANN calls for wholesale DNSSEC deployment
Increasing security measures are driving cybercriminals to alter their
techniques
Insights on modern adversaries and their tactics, techniques, and procedures
IT security incidents affecting German critical infrastructure are on the rise
Latest WinRAR, Drupal flaws under active exploitation
Many computers are vulnerable to hacking through common plug-in devices
Modern browser APIs can be abused for hijacking device resources
Most IoT devices are being compromised by exploiting rudimentary
vulnerabilities
Phishers' new trick for bypassing email URL filters
Phishing, software supply chain attacks greatest threats for businesses
Prevent shadow IT: Companies need security covering multiple communication
vectors
Privileged credential abuse is involved in 74% of data breaches
Researchers and businesses need to work together to expose IoT
vulnerabilities
Rockwell Automation industrial energy meter vulnerable to public exploits
Ryuk: What does the helpdesk tell us?
Social media-enabled cybercrime is generating $3.25 billion a year
Tech companies fret over data privacy, but ready to bet on IPO market
The importance of consumer trust in the second-hand mobile market
The risks associated with the influx of unauthorized collaboration tools
Webinar: Defending account takeovers at Remitly
There was a major rise in Chinese state-sponsored cyber-
activity in 2018 while Russian actors were by far the most
from CrowdStrike..
Australian Prime Minister Scott Morrison has blamed a
“sophisticated state actor” for the recent attempt to hack
the parliament’s computer network
#CPX360 Prepare for Next Generation of Attacks with Prevention Focus
19-Year-Old Awarded More than $1M in Bug Bounties
APT Uses Arsenal of Tools to Evade Detection
Aussie Heart Hospital Hit by Ransomware Blitz
Australian PM Blames “Sophisticated State Actor” for Parliament Hack
Blacklist Fail Allows Hacker to Steal $7m in Cryptocurrency
Breaking Silos Could Reduce Breach Costs
Cloud Adoption on the Rise, IT Pros Unsure of Risk
Coinhive Monero Miner Set to Close
Criminals Phishing for Porn Site Credentials
Domain Squatting a Problem for Many Media Outlets
Dow Jones Leaks Global Watchlist Data
Europe Intros Global IoT Security Standard
Flaws Discovered in Popular Password Managers, Report Claims
Former Grad Destroys Computers with Killer USB
GCHQ Boss: China’s Tech Rise a “First Order” Cyber Challenge
Global Spam Calls Hit 85 Billion in 2018
Half of UK Firms Have Unknown Devices on the Network
Healthcare Breaches Affected 11.5 Million People in 2018
Hiring, Threats and Budget Cause Biggest Security Headaches
ICANN: We Need DNSSEC Everywhere to Combat Hijackers
Labour Issues GDPR Warning After Breach Rumors
Lazarus Suspected of Targeting Russian Orgs
MassCyberCenter Says State Faces Increased Threats
Microsoft: Russians Hacking Again Ahead of Euro Elections
Most UK IT Security Leaders Fear CNI Attack
NCSC Boss: Huawei Security Concerns Aren’t About China
POS Firm Hacked, Data-Stealing Malware Deployed at 100+ Outlets
Ransomware Revenue Earning Does Not Match Infection Decline
Scarlet Widow Targets K-12 Schools, Nonprofits
Sextortion Accounts for 10% of Spear-Phishing Emails
Social Media Drives $3.2bn+ in Black Hat Profits
Sweden’s Patient Hotline in Privacy Snafu
Swedish Privacy Snafu Affected More Companies
Threat Report Tries to Change Security's Narrative
Tik Tok Kids’ App Hit by Record $5.7m FTC Fine
Trend Micro Blocks Over 48 Billion Threats in 2018
Trojan Attack Masked as Payment Confirmation
TurboTax Users Hit by Credential Stuffing Attack
UK Banks Reported 480% More Breaches in 2018
Value of Stolen Card and Amazon Account Details Rockets
Web Application Security Poses Greatest Risk