El Diario del CISO El Diario del CISO (The CISO Journal) Edición 5 | Page 7

News1 EL DIARIO DEL CISO (THE CISO JOURNAL) Pensando y Trabajando por un Líder de Seguridad Digital Privacy Ops: The New Nexus for CISOs & DPOs No longer can privacy be an isolated function managed by legal or compliance departments with little or no connection to the organization's underlying security technology. 'Formjacking' Compromises 4,800 Sites Per Month. ... 19 Minutes to Escalation: Russian Hackers Move the ... A 'Cloudy' Future for OSSEC As Businesses Move Critical Data to Cloud, Security ... Breach in Stanford System Exposes Student Records Cyber Extortionists Can Earn $360,000 a Year Dark Reading Data Leak Exposes Dow Jones Watchlist Database Human Negligence to Blame for the Majority of ... ICS/SCADA Attackers Up Their Game In 2019, Cryptomining Just Might Have an Even ... Insurer Offers GDPR-Specific Coverage for SMBs IoT, APIs, and Criminal Bots Pose Evolving Dangers More Than 22,000 Vulns Were Disclosed in 2018, 27% ... New Malware Campaign Targets Job Seekers North Korea's Lazarus Group Targets Russian ... Persistent Attackers Rarely Use Bespoke Malware Prep for The Next Cybersecurity Arms Race at Black ... Researchers Build Framework for Browser-Based Botnets Russian Hacker Pleads Guilty to Bank Fraud Secure the System, Help the User Security Experts, Not Users, Are the Weakest Link Security Firm to Offer Free Hacking Toolkit Security Leaders Are Fallible, Too Security Pros Agree: Cloud Adoption Outpaces Security Security Spills: 9 Problems Causing the Most Stress Solving Security: Repetition or Redundancy? The Anatomy of a Lazy Phish To Mitigate Advanced Threats, Put People Ahead of Tech TurboTax Hit with Credential Stuffing Attack, Tax Returns Compromised Turkish Group Using Phishing Emails to Hijack ... Why Cybersecurity Burnout Is Real (and What to Do ... Your Employees Want to Learn. How Should You Teach ... Teen becomes first millionaire through HackerOne bug bounties - computerweekly.com A bug bounty is an award given to a hacker who reports a valid security weakness to an organisation Critical Drupal Vulnerability Allows Remote Code Execution Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek.He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. 'Thunderclap' Flaws Expose Computers to Attacks via Peripheral Devices Backdoor Targets U.S. Companies via LinkedIn Breach at PoS Firm Hits Hundreds of U.S. Restaurants, Hotels British Intelligence Says Huawei Risk Manageable: FT Bug Allows Bypass of WhatsApp Face ID, Touch ID Protection Canada Helping Australia Determine 'Full Extent' of Hack Cisco Patches Critical Vulnerability in Wireless Routers Cobalt Strike Bug Exposes Attacker Servers Cybercriminals Promise Millions to Skilled Black Hats: Report DDoS-for-Hire Service Admin Pleads Guilty Got Critical Infrastructure? Then You Should Know How To Protect It Huawei Says US Has 'No Evidence' of 5G Spying Allegations Magecart Hackers Change Tactics Following Public Exposure Market Trends and What to Watch for at RSA Conference 2019 Neverquest Trojan Operator Pleads Guilty New Attacks Show Signed PDF Documents Cannot Be Trusted Rockwell Automation to Patch Publicly Disclosed Power Monitor Flaws Russia's Ex-Cybersecurity Chief Gets 22-Year Sentence in Jail Securing Digital Convergence Supply Chain Attacks Nearly Doubled in 2018: Symantec Two White Hats Earn Over $1 Million via Bug Bounty Programs U.S. Government Says Thales Must Divest HSM Business Before Acquiring Gemalto Warning Issued Over Attacks on Internet Infrastructure WinPot ATM Malware Resembles a Slot Machine WinRAR Vulnerability Exposes Millions of Users to Attacks Data Breaches of the Week: Tales of PoS Malware, Latrine Status | Threatpost | The first stop for security news The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Activist Lauri Love’s computer ‘contained hacked data’, says judge Businesses urged to prepare for extortion campaigns Cooperation a key theme of Brussels cyber security symposium Cyber awareness of UK boards found wanting Cyber criminals earn $3bn a year exploiting social platforms Cyber power needs wider discussion, says GCHQ director EU gathers momentum in cyber security legislation and cooperation Icann calls for community collaboration to protect the internet IT Priorities 2019: Cyber security and risk management among top priorities for 2019 RSA Security bets on digital risk management Security is battling to keep pace with cloud adoption Security Think Tank: Cyber metrics need to be meaningful Supplier consolidation tops infosec goals for 2019 Toyota Australia under cyber attack UK committed to working with EU cyber security partners Using simulated disaster management to tackle the security skills gap Adobe Patches Critical ColdFusion Vulnerability With Active Exploit Adobe Re-Patches Critical Acrobat Reader Flaw Card-Skimming Scripts Hide Behind Google Analytics, Angular Cisco Fixes Critical Flaw in Wireless VPN, Firewall Routers Cisco Patches High-Severity Webex Vulnerability For Third Time Coinhive to Mine Its Last Monero in March Highly Critical Drupal CMS Flaw Affects Millions of Websites Necurs Botnet Evolves to Hide in the Shadows, with New Payloads Podcast: RSA Conference 2019 Preview Ring Doorbell Flaw Opens Door to Spying The Dark Sides of Modern Cars: Hacking and Data Collection ThreatList: Porn-Focused Malware Triples, Dark Web Loves It Threatpost News Wrap Podcast For Feb. 22 Threatpost Poll: Are Password Managers Too Risky?