El Diario del CISO El Diario del CISO (The CISO Journal) Edición 7 | Page 9
News2
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Thinking and Working for a
Digital Security Leader
Healthcareinfosecurity
Email Server Migration Incident Impacts 277,000
Managing Security Stack Sprawl
Mental Healthcare Providers Respond to Ransomware Attacks
'Operation ShadowHammer' Shows Weakness of Supply Chains
Oregon Agency Reports Phishing Attack Affecting 350,000
Report: Half of Breaches Trace to Hacking, Malware Attacks
The Art and Science of Cybersecurity Research
Unsecure Fax Server Leaked Patient Data
Warnings Issued About Medtronic Cardiac Devices
Securitynow
5 Years of the NIST Cybersecurity Framework
Cyber Attacks Grow by 55% in 2018 & Data Theft Dominates
Evidence Found of Malware Families Collaborating
Facebook Exposes Millions of Unencrypted User Passwords
FIN7 Resurfaces With New Malware Techniques
Is Your Supply Chain the Weakest Link?
Norsk Hydro: This Is How You React to a Ransomware Breach
Study Shows Massive Attacks Bypassing MFA
Welivesecurity
Facebook exposed millions of user passwords to employees
Fake or Fake: Keeping up with OceanLotus decoys
Global police arrest dozens of people in dark web sting
I didn’t see what you did, redux
I Still Didn’t See What You Did
Two white hats hack a Tesla, get to keep it
You should pick your Android security app wisely, test shows
Securereading
Facebook Stored Passwords of Hundreds of Millions of Users in Plaintext
Fourth Batch Consisting of 27 Million Stolen Records put for Sale on Dark Web
Hidden UC Browser Feature Exposes Millions of Users to MITM Attacks
New Andriod Trojan Gustuff Targets Banking Apps and Cryptocurrency Services
Threat Actors Discovered Leveraging IMAP to Bypass Multi-Factor Authentication
Cyberdefensemagazine
Inadequate Cyber security Hurts Where it Counts the Most
South Korea – 1,600 guests at 30 motels secretly live streamed
Thomas Edison: An Inspiration for Cybersecurity Inventions
Why Smartphone Security Should Grow Beyond Biometrics
Dataprivacysecurityinsider
LockerGoga Ransomware Hits Manufacturer and Chemical Companies
Orange County, NC Hit with Ransomware Attack
Password Fatigue
Spear Phishing Scheme Dupes Nine Staff Members at Oregon DHS Compromising PHI
of 350,000 in Over 2M Emails
Databreachtoday
FEMA Exposed 2.3 Million Disaster Victims' Private Data
North Carolina County Suffers Repeat Ransomware Infections
Ransomware Attack Costs Norsk Hydro $40 Million - So Far
Trendmicro
Cybersecurity Skills Gap and Legislature
Radio Frequency Technology and Telecom Crimes
What Hacker History Can Tell Enterprises About Future Attack Strategy
Inforisktoday
LockerGoga Ransomware Suspected in Two More Attacks
Steve Katz on Cybersecurity’s State of the Union
Securityboulevar
3 Common Myths and Misconceptions Around Security and Connectivity
Can Victims of Phishing Scams Be Fired for Falling Prey?
How Workload Protection is Transforming Cybersecurity for the Hybrid Cloud
Implanted Medical Devices Can Be Hacked Wirelessly, Warns U.S. Gov't
Insider Threats: A Big Fear for Small Businesses
Is Security the Price of Convenience in Supply Chain Payments?
Microsoft Hurts Charming Kitten (aka the APT35 Iran Hacking Group)
Survey Surfaces Range of Cybersecurity Disconnects
You Need To Know How Cybersecurity Affects Mergers and Acquisitions
Techrepublic
10 tech jobs with the largest gender pay gap
5 IT security roles businesses are most desperate to fill
Data protection: Top 3 business challenges
Is crowdsourcing cybersecurity the answer to CISOs' problems?
No luck hiring a data scientist? Write a better job description
Why 91% of IT and security pros fear insider threats
Why digital transformation could open you up to a DDoS attack
Zdnet
Cybersecurity: Don’t let the small stuff cause you big problems
Dutch hacker who DDoSed the BBC and Yahoo News gets no jail time
Hackers abuse Magento PayPal integration to test validity of stolen credit
cards
Norsk Hydro ransomware incident losses reach $40 million after one week
These are the top ten security vulnerabilities most exploited by hackers
Toyota announces second security breach in the last five weeks
Threatpost
ASUS Patches Live Update Bug That Allowed APT to Infect Thousands of PCs
Magento Patches Critical SQL Injection and RCE Vulnerabilities
Medical Weed Dispensary Exposes Health Data for Thousands
Ransomware Behind Norsk Hydro Attack Takes On Wiper-Like Capabilities
Spycams Secretly Live-Streamed 1,600 Motel Guests
Lawjournalnewsletter
FINRA Report on Best Cybersecurity Practices Is Must-Read, Alston & Bird
Lawyer Says
Is Cyber-Risk Insurable?
The Brave New World of Cybersecurity Due Diligence in Mergers and
Acquisitions: Pitfalls and Opportunities
The Principles of Good Cyber Risk Management
Tripwire
LockerGoga Ransomware Hits Manufacturer and Chemical Companies
Orange County, NC Hit with Ransomware Attack
Password Fatigue
Spear Phishing Scheme Dupes Nine Staff Members at Oregon DHS
Compromising PHI of 350,000 in Over 2M Emails
Solutionreview
Ransomware, Cryptojacking, and Fileless Malware: The Big Three Threats
Snappy Answers to 6 Major Cybersecurity Questions
What is Zero Trust Identity Security? How Can You Implement It?
Govinfosecurity
Australia's Crypto-Cracking Law Is Spooking Big Tech
NSA Pitches Free Reverse-Engineering Tool Called Ghidra
Esecurityplanet
Effective IT Security Awareness Training for Employees
Serverless Cloud Security: How to Secure Serverless Computing
www.cisos.club
[email protected]