El Diario del CISO El Diario del CISO (The CISO Journal) Edición 5 | Page 7
News1
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Pensando y Trabajando por
un Líder de Seguridad Digital
Privacy Ops: The New Nexus for
CISOs & DPOs
No longer can privacy be an isolated function managed
by legal or compliance departments with little or no
connection to the organization's underlying security
technology.
'Formjacking' Compromises 4,800 Sites Per Month. ...
19 Minutes to Escalation: Russian Hackers Move the ...
A 'Cloudy' Future for OSSEC
As Businesses Move Critical Data to Cloud, Security ...
Breach in Stanford System Exposes Student Records
Cyber Extortionists Can Earn $360,000 a Year
Dark Reading
Data Leak Exposes Dow Jones Watchlist Database
Human Negligence to Blame for the Majority of ...
ICS/SCADA Attackers Up Their Game
In 2019, Cryptomining Just Might Have an Even ...
Insurer Offers GDPR-Specific Coverage for SMBs
IoT, APIs, and Criminal Bots Pose Evolving Dangers
More Than 22,000 Vulns Were Disclosed in 2018, 27% ...
New Malware Campaign Targets Job Seekers
North Korea's Lazarus Group Targets Russian ...
Persistent Attackers Rarely Use Bespoke Malware
Prep for The Next Cybersecurity Arms Race at Black ...
Researchers Build Framework for Browser-Based Botnets
Russian Hacker Pleads Guilty to Bank Fraud
Secure the System, Help the User
Security Experts, Not Users, Are the Weakest Link
Security Firm to Offer Free Hacking Toolkit
Security Leaders Are Fallible, Too
Security Pros Agree: Cloud Adoption Outpaces Security
Security Spills: 9 Problems Causing the Most Stress
Solving Security: Repetition or Redundancy?
The Anatomy of a Lazy Phish
To Mitigate Advanced Threats, Put People Ahead of Tech
TurboTax Hit with Credential Stuffing Attack, Tax Returns Compromised
Turkish Group Using Phishing Emails to Hijack ...
Why Cybersecurity Burnout Is Real (and What to Do ...
Your Employees Want to Learn. How Should You Teach ...
Teen becomes first millionaire through
HackerOne bug bounties -
computerweekly.com
A bug bounty is an award given to a hacker who reports
a valid security weakness to an organisation
Critical Drupal Vulnerability Allows
Remote Code Execution
Eduard Kovacs (@EduardKovacs) is a contributing
editor at SecurityWeek.He worked as a high school IT
teacher for two years before starting a career in
journalism as Softpedia’s security news reporter.
'Thunderclap' Flaws Expose Computers to Attacks via Peripheral Devices
Backdoor Targets U.S. Companies via LinkedIn
Breach at PoS Firm Hits Hundreds of U.S. Restaurants, Hotels
British Intelligence Says Huawei Risk Manageable: FT
Bug Allows Bypass of WhatsApp Face ID, Touch ID Protection
Canada Helping Australia Determine 'Full Extent' of Hack
Cisco Patches Critical Vulnerability in Wireless Routers
Cobalt Strike Bug Exposes Attacker Servers
Cybercriminals Promise Millions to Skilled Black Hats: Report
DDoS-for-Hire Service Admin Pleads Guilty
Got Critical Infrastructure? Then You Should Know How To Protect It
Huawei Says US Has 'No Evidence' of 5G Spying Allegations
Magecart Hackers Change Tactics Following Public Exposure
Market Trends and What to Watch for at RSA Conference 2019
Neverquest Trojan Operator Pleads Guilty
New Attacks Show Signed PDF Documents Cannot Be Trusted
Rockwell Automation to Patch Publicly Disclosed Power Monitor Flaws
Russia's Ex-Cybersecurity Chief Gets 22-Year Sentence in Jail
Securing Digital Convergence
Supply Chain Attacks Nearly Doubled in 2018: Symantec
Two White Hats Earn Over $1 Million via Bug Bounty Programs
U.S. Government Says Thales Must Divest HSM Business Before Acquiring
Gemalto
Warning Issued Over Attacks on Internet Infrastructure
WinPot ATM Malware Resembles a Slot Machine
WinRAR Vulnerability Exposes Millions of Users to Attacks
Data Breaches of the Week: Tales of
PoS Malware, Latrine Status |
Threatpost | The first stop for
security news
The administrator of your personal data will be
Threatpost, Inc., 500 Unicorn Park, Woburn, MA
01801.
Activist Lauri Love’s computer ‘contained hacked data’, says judge
Businesses urged to prepare for extortion campaigns
Cooperation a key theme of Brussels cyber security symposium
Cyber awareness of UK boards found wanting
Cyber criminals earn $3bn a year exploiting social platforms
Cyber power needs wider discussion, says GCHQ director
EU gathers momentum in cyber security legislation and cooperation
Icann calls for community collaboration to protect the internet
IT Priorities 2019: Cyber security and risk management among top priorities for
2019
RSA Security bets on digital risk management
Security is battling to keep pace with cloud adoption
Security Think Tank: Cyber metrics need to be meaningful
Supplier consolidation tops infosec goals for 2019
Toyota Australia under cyber attack
UK committed to working with EU cyber security partners
Using simulated disaster management to tackle the security skills gap
Adobe Patches Critical ColdFusion Vulnerability With Active Exploit
Adobe Re-Patches Critical Acrobat Reader Flaw
Card-Skimming Scripts Hide Behind Google Analytics, Angular
Cisco Fixes Critical Flaw in Wireless VPN, Firewall Routers
Cisco Patches High-Severity Webex Vulnerability For Third Time
Coinhive to Mine Its Last Monero in March
Highly Critical Drupal CMS Flaw Affects Millions of Websites
Necurs Botnet Evolves to Hide in the Shadows, with New Payloads
Podcast: RSA Conference 2019 Preview
Ring Doorbell Flaw Opens Door to Spying
The Dark Sides of Modern Cars: Hacking and Data Collection
ThreatList: Porn-Focused Malware Triples, Dark Web Loves It
Threatpost News Wrap Podcast For Feb. 22
Threatpost Poll: Are Password Managers Too Risky?