El Diario del CISO El Diario del CISO (The CISO Journal) Edición 6 | Page 7
News1
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Thinking and Working for a
Digital Security Leader
Cybersecurity skills gap worsens, security
teams are understaffed
As emerging technology and threat landscapes
experience rapid transformation
90% of consumers value additional security measures to verify mobile-based
transactions
A strong security posture starts with application dependency mapping
A third of 2018's vulnerabilities have public exploits, 50% can be exploited
remotely
Attack traffic increased by 32 percent in 2018
Businesses recognize the need for AI & ML tools in cybersecurity
Companies unprepared for PSD2, stricter EU requirements will drive fraud to
other regions
Data breach reports delayed as organizations struggle to achieve GDPR
compliance
Data management challenges are having a severe impact on profitability
Do people with malicious intent present the biggest threat to personal data?
Enterprise attitudes to cybersecurity: Strategies to balance risk and business
acceleration
Exploitation of vulnerabilities in Moxa industrial switches could disrupt
communication between ICS components
Hidden third-party tags could be leaving Fortune 100 companies at risk
How can healthcare organizations remedy their cybersecurity ailments?
How malware traverses your network without you knowing about it
How susceptible are hospital employees to phishing attacks?
Human behavior can be your biggest cybersecurity risk
If an organization has been breached, it's more likely to be targeted again
IoT devices using CoAP increasingly used in DDoS attacks
Is AI really intelligent or are its procedures just averagely successful?
Is your company leaking sensitive data via its Box account?
Key 2019 cybersecurity industry trends
March 2019 Patch Tuesday: Microsoft patches two actively exploited Windows
flaws
Marriott CEO reveals more details about the massive data breach
Network performance requirements grow in the era of 5G: Are your security
processes ready?
Organizations still ignoring a large piece of their cybersecurity defense
Phishers shift efforts to attack SaaS and webmail services
Public-interest technology: Why companies should get involved
Researchers create system that predicts vulnerability severity from tweets
Researchers expose massive mobile adware and data stealing campaigns with
250 million downloads
Researchers unveil February 2019's most wanted malware
The impact of spear phishing on organizations and how to combat this
growing threat
The patterns of elite DevSecOps practices
The quantum sea change: Navigating the impacts for cryptography
The threat of quantum computers and the solutions that can protect us today
Thinking of threat intelligence as a contributing member of your security team
Traditional cybersecurity staff retention tactics becoming less effective
Two thirds of Android antimalware apps are ineffective or unreliable
Unsecured Gearbest server exposes millions of shoppers and their orders
Urgent need for IT security legal framework in Europe
Users are too confident in their protection from threats
What happened to trust and transparency in cybersecurity?
Windows Servers in danger of being compromised via WDS bug
Worldwide spending on public cloud services and infrastructure to increase
23.8% over 2018
A few binary plating 0-days for Windows While we
were thinking about a way to escalate privileges during a pen-
test, we discovered that most Windows installations were
vulnerable to binary planting.
Saudi caller ID Dalil app exposed data of more than 5 million users
Chinese hackers target dozens of
universities in a bid to steal maritime
military secrets
Ryan Stewart. Ryan is a senior cybersecurity and
privacy analyst.
18 unprotected MongoDB servers expose surveillance data
Adwind RAT resurfaces again, relies on another malware for infection
Attackers use new CapturaTela info-stealing malware to launch ‘Operation
Comando’ campaign
Citrix suffered a security breach compromising few business documents
Cryptojacking campaigns now target exposed Docker containers
Cybercriminals leverage ‘Fake CDC Flu’ warning to distribute GandCrab 5.2
ransomware
Email Marketing firm Verifications.io exposes almost 809 million records
online
Financial institutions in Russia targeted using new version of RTM Bot in
recent phishing campaign
Hackers abuse XSS vulnerability in cart plugin to target WordPress-based
shopping sites
Hackers breach college admission database and demand ransom
Hackers defaced multiple Israeli webpages with the words ‘Jerusalem is the
capital of Palestine’
Kathmandu Holdings suffered a data breach compromising customers’
personal information
Latest Ursnif variant targets Japanese users to steal credentials
Necurs botnet packs new payloads to evade detection
New backdoor ‘SLUB’ targets victims via watering hole attack
New Cryptomix ransomware variant targets entire networks instead of
individual computers
New GarrantyDecrypt ransomware variant impersonates the security team for
Proton Technologies
New malware campaign distributes StealthWorker malware to compromise
multiple platforms
New Ransomware-as-a-Service ‘Jokeroo’ promoted on underground hacking
forums
New Ransomware-as-a-Service ‘Yatron’ promoted via Twitter
Newly discovered ‘SPOILER’ vulnerability found affecting all Intel CPUs
Newly discovered vulnerability could allow attackers to take full control of
Windows IoT Core devices
Popular Visitor Management Systems exposed due to security bugs
Ransomware attacks evidenced in Jackson County proves costly for officials
Reverse engineering tool Ghidra made by NSA is now open-source!
School information system hacked; Students’ grades and attendance data
modified
Seven car manufacturers hit by GPS spoofing attacks
Severe RCE vulnerability found in StackStorm DevOps platform
Sharecare Health Data Services suffered data breach impacting AltaMed and
Blue Shield healthcare centers
Torrent trackers used to distribute Pirate Matryoshka malware
UN report unravels North Korea’s involvement in cryptocurrency-related
attacks
Unprotected database exposes private data of 1.8 million Chinese women
including 'BreedReady' status
Unprotected MongoDB of Dalil exposes data of over 5 million users
Unsecured API of ‘63Red Safe’ app exposes user data
Winnti cyberespionage group breaches three Asian gaming companies to
install a backdoor trojan
Wolverine Solutions Group data breach impacts hundreds of healthcare
organizations
T he Digital Transformation of the CISO, from
backroom to boardroom
IDC in conjunction with
Capgemini, recently published an analysis of the modern
CISO.
Why cybersecurity alone is not enough to protect private data