El Diario del CISO (The CISO Journal) Edición 8 2018 - Page 10



Bankshot Trojan Targets Turkish Financial Sector Memcached DDoS Attacks: 95,000 Servers Vulnerable to Abuse Putin Offers Extradition Promise to US: 'Never' Top US General: Response to Russia Not Unified Ukraine Sentences Two Citizens For DDoS Extortion Campaigns Techrepublic 5 easy ways to keep yourself cybersecure at work Bad user practices caused 41% of medical IoT security issues in 2017 How global CXOs can improve their security posture: 6 tips New cryptojacking attack uses WannaCry exploit to mine on Windows servers Nakedsecurity “Big Bitcoin Heist” sees 600 Icelandic servers stolen Cryptomining versus cryptojacking – what’s the difference? How women are helping to fight cybercrime Securityintelligence Mobile Banking Trojans as Keen on Cryptocurrency as PC Malware Seize the Day: Celebrating Women in Security Gbhackers Mobile malware evolution 2017 OlympicDestroyer is here to trick the industry The devil's in the Rich header Securereading 4G LTE ENDANGERED WITH VULNERABILITIES! HOW ABOUT 5G? FlawedAmmyy RAT Targets Users via Massive Email Campaigns Triada Banking Trojan Found on 42 Models of Low-Cost Android Smartphones Infosecinstitute 7 Common Penetration Testing Mistakes Top 6 Mobile Application Penetration Testing Tools Securityledger China caught pushing Vulnerability Reporting Delays down the Memory Hole No Teeth in UK Internet of Things Security Report Healthcareinfosecurity In a Single Night Cybercriminal Gang stole 3.8 million slopes (€ 860,000) from Breach Alert Service: UK, Australian Governments Plug In 32 ATMs Powerful APT Malware “Slingshot” Performs Highly Sophisticated Cyber Why Ransomware Attacks Are a Security Wake-Up Call Attack to Compromise Router Techradar Here's the monthly cybersecurity audit you should be carrying These are the most influential people in cybersecurity right now ScmagazineUK Hackers using blockchain to keep authorities at bay & to sustain operations Hospitality industry is key infosec battleground Malwarebytes Building an incident response program: creating the framework Securitybrief Microsoft explores Australian CISOs' most common problems in cybersecurity What cyber security needs to go beyond the network Cnet Bitcoin value plunges after SEC cryp ѽɕ䁕፡݅ɹ)9ѥ͕ɥ䁍ɹ́䁑Ʌ ɽȁEՅ)]ɕ)19MQQɥѽɥєÍٕѡ́1Ё)!(