El Diario del CISO (The CISO Journal) Edición 18 | Page 9

Bug In Git Opens Developer Systems Up to Attack
Researchers Warn of Microsoft Zero-Day RCE Bug
Despite Ringleader ' s Arrest , Cobalt Group Still Active
SEVered Attack Extracts the Memory of AMD-Encrypted VMs
Fraudsters Claim To Hack Two Canadian Banks
Singapore ISP Leaves 1,000 Routers Open to Attack
Hidden cobra strikes again with custom rat , smb malware
Sonic Tone Attacks Damage Hard Disk Drives , Crashes OS
Honda , Universal Music Group Expose Sensitive Data in Misconfig Blunders
Ticketfly , Major Concert Venues Still Offline After Hack
Mental Health Provider Pays Ransom to Recover Data
Not GDPR Compliant Yet ? Don ' t Panic
Do Data Breaches Permanently Affect Business Reputations ?
Spurred by GDPR , Australian Businesses Catch Up on Privacy
GDPR Enforcement Deadline : If You Blew It , What ' s Next ?
Two Canadian Banks Probe Alleged Exposure of Customer Data
Hacker Who Sold Financial Data Receives 10-Year Sentence
Two Canadian Banks Warn Customers of Possible Breach
Hackers Demand $ 770,000 Ransom From Canadian Banks
US-CERT issued an alert on two malware associated with North Korea-linked
APT Hidden Cobra
In Australia , Email Compromise Scams Hit Real Estate
Women in Security : Assessing the Progress
Lawsuit Filed in Wake of Under Armour Data Breach
Yet Another Twist in Messy Aetna Privacy Breach Case
Accused Yahoo Hacker Gets Five Years in Prison , Fine
Are attackers harnessing your Redis server ?
Europol Creates Dark Web Investigations Team
Attacking hard disk drives using ultrasonic sounds
FUD Crypters Recycling Old Malware
CIOs are forced to compromise between faster innovation and perfectly working software
GDPR : What Every Organization Should Ask Itself
Cryptomining apps are on the rise , malicious apps in app stores decline
Major Canadian Banks Investigating Data Breach Claims
Make certificate visibility and security a part of your overall security program
New Trojan Uses SQL Server for C & C
Quantifying cyber exposure : Attackers are racing ahead
Tens of Vulnerabilities Found in Pentagon Travel Management System
Smart cities : New threats and opportunities
The Current Limitations and Future Potential of AI in Cybersecurity
The emergence and impact of the Data Protection Officer
The War Few Are Talking About
Ticketfly got hacked , user data was leaked
Tips for Hardening Networks Against IoT-based DDoS Attacks
What CISOs can learn from Tyrion on Game of Thrones
What The Tempest Can Teach Us About Security Operations
Will GDPR be the death of WHOIS ?
BackSwap Banking Trojan uses New Techniques Steal Money from your
Are Ransomware Attacks Rising or Falling ?
Critical Flaw Discovered in the Cisco ’ s SSL VPN Solution
Cost of Average Enterprise Data Breach Surpasses $ 1 Million
Germany Admits Hackers have Infiltrated their Computer Networks
GDPR Breach Notification : What Are the Requirements for Response ?
Ikea ’ s TaskRabbit Confirms Security Breach in its Website and App
Insider Threats : Healthcare ' s Persistent IT Infection
North Korea is behind Joanap and Brambul Malware Attacks
May ' s Cybersecurity Recap : Welcome to the GDPR Compliance Show
Bug In Git Opens Developer Systems Up to Attack Despite Ringleader's Arrest, Cobalt Group Still Active Fraudsters Claim To Hack Two Canadian Banks Hidden cobra strikes again with custom rat, smb malware Honda, Universal Music Group Expose Sensitive Data in Misconfig Blunders Mental �V�F�&�f�FW"�2&�6��F�&V6�fW"FF�F�FF'&V6�W2W&��V�FǒffV7B'W6��W72&WWFF���3�tE"V�f�&6V�V�BFVFƖ�S��b��R&�Wr�B�v�Bw2�W�C�6�W"v��6��Bf���6��FF&V6V�fW2ՖV"6V�FV�6P��6�W'2FV��BCss�&�6��g&��6�F��&�0���W7G&Ɩ�V���6��&�֗6R66�2��B&V�W7FFP��w7V�Bf��VB��v�R�bV�FW"&��W"FF'&V6��6V7W&�G�vVV��67W6VB�����6�W"vWG2f�fR�V'2��&�6���f��P�WW&���7&VFW2F&�vV"��fW7F�vF���2FVФeTB7'�FW'2&V7�6Ɩ�r��B��v&P�tE#�v�BWfW'��&v旦F���6��V�B6��G6V�`����"6�F��&�2��fW7F�vF��rFF'&V6�6���0��WrG&���W6W25�6W'fW"f�"2d0�FV�2�bgV��W&&�ƗF�W2f�V�B��V�Fv��G&fV���vV�V�B7�7FVХF�R7W'&V�BƖ֗FF���2�BgWGW&R�FV�F���b���7�&W'6V7W&�G��F�Rv"fWr&RFƶ��r&�W@�F�2f�"�&FV��r�WGv�&�2v��7B��B�&6VBDF�2GF6�0�v�BF�RFV�W7B6�FV6�W2&�WB6V7W&�G��W&F���0�6V7W&W&VF��p�&6�7v&涖�rG&���W6W2�WrFV6��VW27FV����W�g&����W �66�V�@�7&�F�6�f�rF�66�fW&VB��F�R6�66�( �254�e�6��WF���vW&��F֗G2�6�W'2�fR��f��G&FVBF�V�"6��WFW"�WGv�&�0���V( �2F6�&&&�B6��f�&�26V7W&�G�'&V6����G2vV'6�FR�B���'F���&V�2&V���B����B'&�'V���v&RGF6�0�&W6V&6�W'2v&��b֖7&�6�gB�W&��F�$4R'Vp�4UfW&VBGF6�W�G&7G2F�R�V��'��b�B�V�7'�FVBd�0�6��v�&R�5�VfW2�&�WFW'2�V�F�GF6��6��2F��RGF6�2F�vR�&BF�6�G&�fW2�7&6�W2�0�F�6�WFfǒ����"6��6W'BfV�VW27F����ffƖ�RgFW"�6����BtE"6��Ɩ�B�WC�F��wB�0�7W'&VB'�tE"�W7G&Ɩ�'W6��W76W26F6�W��&�f7��Gv�6�F��&�2&�&R��VvVBW��7W&R�b7W7F��W"FF�Gv�6�F��&�2v&�7W7F��W'2�b�76�&�R'&V6��U2�4U%B�77VVB��W'B��Gv���v&R76�6�FVBv�F���'F���&V�Ɩ�V@�B��FFV�6�'&�v��V���6V7W&�G��76W76��rF�R&�w&W70��WB��F�W"Gv�7B���W77�WF�&�f7�'&V6�66P��V��WG6V7W&�G��&RGF6�W'2�&�W76��r��W"&VF�26W'fW#�GF6���r�&BF�6�G&�fW2W6��rV�G&6��26�V�G0�4��2&Rf�&6VBF�6��&�֗6R&WGvVV�f7FW"����fF����BW&fV7Fǐ�v�&���r6�gGv&P�7'�F�֖��r2&R��F�R&�6R��Ɩ6��W22��7F�&W2FV6Ɩ�P���R6W'F�f�6FRf�6�&�ƗG��B6V7W&�G�'B�b��W"�fW&��6V7W&�G�&�w&ХV�F�g���r7�&W"W��7W&S�GF6�W'2&R&6��r�V@�6�'B6�F�W3��WrF�&VG2�B��'GV�F�W0�F�RV�W&vV�6R�B��7B�bF�RFF&�FV7F����ff�6W �F�6�WFfǒv�B�6�VB�W6W"FFv2�V�V@�v�B4�4�26��V&�g&��G�&�����v�R�bF�&��W0�v���tE"&RF�RFVF��bt���3�6V7W&�G���FV�ƖvV�6P�&R&�6��v&RGF6�2&�6��r�"f�Ɩ�s�6�7B�bfW&vRV�FW'&�6RFF'&V6�7W'76W2C֖�Ɩ��tE"'&V6���F�f�6F���v�B&RF�R&WV�&V�V�G2f�"&W7��6S��6�FW"F�&VG3��V�F�6&Rw2W'6�7FV�B�B��fV7F�����w27�&W'6V7W&�G�&V6�vV�6��RF�F�RtE"6��Ɩ�6R6��p