El Diario del CISO El Diario del CISO (The CISO Journal) Edición 6 | Page 9
News2
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Thinking and Working for a
Digital Security Leader
Threatpost
Citrix Falls Prey to Password-Spraying Attack
Insider Threats Get Mean, Nasty and Very Personal
Lenovo Patches Intel Firmware Flaws in Multiple Product Lines
RSA Conference 2019: Emotet Takes Aim at Latin America
RSA Conference 2019: Firms Continue to Fail at IoT Security
RSA Conference 2019: NIST's Privacy Framework Starts to Take Shape
RSA Conference 2019: Operational Technology Widens Supply Chain Attack
Surfaces
RSA Conference 2019: Picking Apart the Foreshadow Attack
RSA Conference 2019: The Expanding Automation Platform Attack Surface
RSA Conference 2019: Ultrasound Hacked in Two Clicks
RSAC 2019: An Antidote for Tech Gone Wrong
RSAC 2019: Malicious Emailed URLs See Triple-Digit Increase
RSAC 2019: Microsoft Zero-Day Allows Exploits to Sneak Past Sandboxes
RSAC 2019: Most Consumers Say ‘No’ to Cumbersome Data Privacy Practices
RSAC 2019: New Operation Sharpshooter Data Reveals Higher Complexity,
Scope
RSAC 2019: The Dark Side of Machine Learning
Threatlist: IMAP-Based Attacks Compromising Accounts at 'Unprecedented
Scale'
ThreatList: Phishing Attacks Doubled in 2018
Zero-Days in Counter-Strike Client Used to Build Major Botnet
CSHUB
Cyber Security Challenges, Focuses 2019
Cyber Security Continues To Drive Tech Spending in 2019
Education Is Key When Selling Security Services
Incident Of The Week: Malware Attack Exposes Patient Data
Magecart Web-Based Supply Chain Attacks Increasing
NIST Privacy Framework Announced At RSAC
RSAC Day 1 Theme: People And Tech Are ‘Better Together’
RSAC Opening Day Focuses On Cyber Security Talent
TF 7 Radio Covers What's Going On At RSAC This Week
Forbes
A CEO Cheat Sheet For The Cybersecurity Big One
Chinese Data Breach Exposes 'Breed Ready' Status Of Almost 2 Million Women
Council Post: Challenges That Cause CISOs To Fail
Council Post: Continuous Risk, Security And Compliance For Cybersecurity Posture
Management: A Unified Approach
Huawei Denies Then Plays The Blame Game Over Cybersecurity Vulnerabilities
Tech Companies Put Onus On Women To Protect Themselves From Cyber Crime
Was The Facebook Outage A Cyber-Attack?
Why Should They Listen to the CISO?
Securitynow
Boosted Rowhammer & Cache Attacks Spell Bad News for Intel
Can Social Media Chatter Predict the Severity of Cybersecurity Threats?
Convergence: Real Problems When it Comes to Securing the IoT/IIoT
Is China as Bad as Russia When It Comes to Trying to Influence America?
North Korea Circumvents Sanctions Through Cybercrime, Says Report
Qbot Mutation Poses Global Threat
Study Finds 77% of Mobile Users Compromised by Leak of PII Data
Welivesecurity
Facebook suffer most severe outage ever, family of apps also impacted
International Women’s Day 2019: How can we be better allies?
IoT security meets SMB on the floor of RSA 2019
Over 2 billion records exposed by email marketing firm
RSA 2019: Protecting your privacy in a NIST and GDPR world
RSA conference, USA 2019: Keynotes and key words
Information-management
5 steps to performing an effective data security risk assessment
600,000 affected by huge data breach in Michigan
7 emerging data security and risk management trends
9 steps organizations can take to get ahead of new data privacy laws
Artificial intelligence and cybersecurity: Attacking and defending
Delaware Guidance pays ransom to get its records back
How regular phishing drills keep providers’ data safe
Pressured by pending procedures, surgical practice pays ransom
SSL/TLS-based data security threats are on the rise
Success with the IoT starts with understanding 'Thing Management'
Computerweekly
Almost half UK firms hit by phishing attacks
Avoid infosec mistakes of the past, urges Robert Hannigan
Citrix breach once again highlights password weaknesses
Cyber attackers favouring stealthier attacks, says Darktrace
Cyber espionage group behind SingHealth attack
Many firms unaware of data exfiltration threat
National Cyber Security Programme at risk of missing targets
Is it true you can't manage what you don't measure?
No one key risk indicator is generic across all businesses
Thehackersnews
BEWARE – New 'Creative' Phishing Attack You Really Should Pay Attention To
Citrix Data Breach – Iranian Hackers Stole 6TB of Sensitive Data
Google Launches Backstory — A New Cyber Security Tool for Businesses
Microsoft Releases Patches for 64 Flaws — Two Under Active Attack
New WordPress Flaw Lets Unauthenticated Remote Attackers Hack Sites
Patched WinRAR Bug Still Under Active Attack—Thanks to No Auto-Updates
Telegram Gained 3 Million New Users During WhatsApp, Facebook Outage
Zero-Day Flaws in Counter-Strike 1.6 Let Malicious Servers Hack Gamers' PCs
ETCiso
‘Ransomware’ attack on Lucknow’s 5-star hotel, cyber-cell grapples for clues
6 things small businesses can do to improve cybersecurity
60% online users fear unauthorised data collection, only 11% users read
privacy policies: Survey
As the web turns 30, is it an 'out-of-control monster'?
Demat account fraud: How to safeguard against demat account fraud
Hackers steal data from Citrix
Phishing attacks more than double in 2018: Kaspersky
Zdnet
Cybersecurity: Why bosses are confident, and tech workers are scared
NSW Electoral Commission claims physical separation mitigates Swiss voting
flaw
Proof-of-concept code published for Windows 7 zero-day
Singapore proposes new security guidelines to beef up financial resilience
Smart 'unhackable' car alarms open the doors of 3 million vehicles to hackers
Study shows programmers will take the easy way out and not implement
proper password security
WordPress shopping sites under attack
SCmagazine
Are employees the weakest (cybersecurity) link? Sometimes
Celebrating 30 years in cybersecurity
Columbia Surgical Specialists pay $15,000 ransom to unlock files
DoS vulnerability found in Cisco SPA514G IP phones
Dozens of high-profile Box accounts found leaking sensitive data
Facebook phishing campaign hitting iOS users
www.cisos.club
[email protected]