El Diario del CISO El Diario del CISO (The CISO Journal) Edición 9 | Page 6
News0
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Thinking and Working for a
Digital Security Leader
International InfoSec & Cybersecurity News
How a Chinese Nation-State Group
Reverse-Engineered NSA Attack
Tools
New Symantec research shows how the Buckeye
group captured an exploit and backdoor used by the
National Security Agency and deployed them on
other victims.
'Matrix'-Themed Ransomware Variant Spreads
8 Personality Traits for Cybersecurity
Better Behavior, Better Biometrics?
Credit Card Compromise Up 212% as Hackers Eye ...
Data Dump Purportedly Reveals Details on Previously ...
Docker Forces Password Reset for 190,000 Accounts ...
FBI: Cybercrime Losses Doubled in 2018
How Storytelling Can Help Keep Your Company Safe
How the Skills Gap Strains - and Constrains - ...
How to Close the Critical Cybersecurity Talent Gap
How to Help Your Board Navigate Cybersecurity's ...
How We Collectively Can Improve Cyber Resilience
Misconfigured Ladders Database Exposed 13M User Records
New Initiative Aims to Fast-Track Women into ...
Orgs Are Quicker to Disclose Breaches Reported to ...
Password Reuse, Misconfiguration Blamed for ...
Peer-to-Peer Vulnerability Exposes Millions of IoT ...
Russian Nation-State Group Employs Custom Backdoor ...
Security Doesn't Trust IT - and IT Doesn't Trust ...
Security Top Concern as Mobile Providers Think 5G
Social Engineering Slams the C-Suite: Verizon DBIR
Study Exposes Breadth of Cyber Risk
The Big E-Crime Pivot
The Dark Web Is Smaller Than You Think
The Fine Line of Feedback: 6 Tips for Talking to ...
Trust the Stack, Not the People
US DoJ Indicts Chinese Man for Anthem Breach
US States with the Worst Consumer Cyber-Hygiene
Why Are We Still Celebrating World Password Day?
Simplifying Cyber security
Deployments with Automation –
Cyber Defense Magazine
Security is a whole lot like quantum mechanics. It’s
rife with uncertainty and you can’t observe your
infrastructure without affecting it.
4 Signs Your Organization is a Good Cyber Attack Target, and What to Do
about It
8 Cyber security Practices In Health IT Domain That Every Company Should
Learn From
Cutting Through the Hype-The Realistic Flaws of a Zero Trust Security
Model
Enterprise Insider Threats on the Rise
On Security and Privacy, States Are Taking the Lead
SOAR: The Key to Building a Trustworthy Iot
The Internet of Things Signal Transmission Challenges
Your Security Teams are Destroying Critical Evidence
Zero Trust Security
Five Red Flags You Have a Cyber Security Insights Problem
Top Russian Hacking Group Breaches
Three AV Companies - Infosecurity
Magazine
A report published today by Advanced Intelligence
revealed that three US-based antivirus software
vendors have been breached, and a high-profile
collective of Russian hackers is claiming responsibility
#Belfast2019: Cybersec Industry to Generate £70m+ in Salaries in Northern Ireland
Baltimore Severs Down After Ransomware Attack
C-Suite Under Attack as Money and Data Drive Breaches
Canadian Telco Exposes Unencrypted Card Details
Cyber-Attacks in UK Grew by 140% in 2018
DHS Releases Analysis of ELECTRICFISH Malware
Europol: Two More Dark Web Marketplaces Have Been Seized
Fin7 APT Targets Over 130 Orgs after Leader's Arrest
Hackers Steal 7K BTC from Binance Cryptocurrency
Holiday Scammers Made £7m in 2018
Israel Responds to Cyber-Attack with Air Strike
Major Uptick in IoT-Related Breaches and Attacks
Matrix-Themed Ransomware MegaCortex Spikes in May
Most Firms Rely on Trust Alone for Supply Chain Security
New Magecart Group Steals Data from 201 Campus E-Stores
Only 0.25% of Reported Data Breaches Have Led to Fines Since GDPR
Orange Gains SecureLink, Advances Cyber Offerings
Russia Uses Social Media to Sway Public Opinion
Ukrainian Faces US Charges for Five-Year Malvertising Campaign
Websites Continue to Collect PII Data Insecurely
50,000 companies running SAP
installations open to attack via
publicly released exploits - Help Net
Security
Two exploits publicly released in late April at the
OPCDE security conference in Dubai could be
leveraged to compromise a great number of SAP
implementation
3 months, 1900 reported breaches, 1.9 billion records exposed
60% of businesses have experienced a serious security breach in the last two years
Bad actors increasingly spreading misinformation via social media ahead of EU
elections
C-level executives increasingly and proactively targeted by social breaches
C-Suite execs and policy makers find cybersecurity technology investments
essential
Consumers care deeply about their privacy, security, and how their personal
information is handled
Cybercriminals targeting social media: Facebook and Instagram are becoming
phishers’ favorites
How institutions, advisors, and investors think about digital assets
Is curiosity killing patient privacy?
Most SMBs would pay a ransom in order to recover stolen data
Network as a Service market to exceed $50bn by 2025
Researchers discover highly stealthy Microsoft Exchange backdoor
Securing satellites: The new space race
The IoT threat landscape is expanding rapidly, yet few companies are addressing
third party risk factors
The leading sources of stress for cybersecurity leaders? Regulation, threats, skills
shortage
Trust is at a tipping point: Consumers will react strongly if they feel their privacy is
compromised
Unhackable? New chip makes the computer an unsolvable puzzle
What differentiates the strongest cybersecurity programs from the rest
Whose (usage) data is it, anyway?