El Diario del CISO (The CISO Journal) Edición 14 | Page 9
Australia's Commonwealth Bank Data Loss
Australia's Largest Bank Lost The Personal Financial Histories Of 12 Million
Customers GPON Home Routers Vulnerability
Ixia Releases 2018 Security Report, Highlighting Cybersecurity Risk To
Enterprise Cloud Operations
Confessions Of A Hacker-Holic – Unit 42 Opens Up TheBottle Lessons Learnt From The Twitter And Aleksandr Kogan Scandal
Cyber Security Breaches Survey 2018
Cybersecurity Strategies Neglected In Wake Of The Boardroom’s Quest For
Digital NHS Switches To Windows 10 In The Wake Of WannaCry
Dark Matter Popular Medical Device Security Advisories
DCMS Warns On Cyber Risks Twitter Forces Password Reset - Ironically, It's "World Password Day!"
Orangeworm Cyberattack Targets Healthcare Organizations
FacexWorm
A Look Inside: Bug Bounties and Pen Testing
Abbott Addresses Life-Threatening Flaw in a Half-Million Pacemakers
Boutique Shops Offering Rewards Points Pop Up on the Dark Web
Critical Cisco WebEx Bug Allows Remote Code Execution
Free Speech Advocates Blast Amazon Over Threats Against Signal
Hacktivists, Tech Giants Protest Georgia's 'Hack-Back' Bill
Kitty Cryptomining Malware Cashes in on Drupalgeddon 2.0
KRACK Vulnerability Puts Medical Devices At Risk
MassMiner Takes a Kitchen-Sink Approach to Cryptomining
Millions of Home Fiber Routers Vulnerable to Complete Takeover
Australia's Biggest Bank Loses 20 Million Customer Records
Banks Don't Want to be Weakest Link in Blockchain Revolution
Commodity Ransomware Declines as Corporate Attacks Increase
Evasive Malware Now a Commodity
GandCrab Ransomware Breaks Windows 7 Systems
Hackers Target Flaws Affecting a Million Internet-Exposed Routers
Has Your Company's Infrastructure Been Hijacked by Bitcoin Miners?
Industrial Networks Easy to Hack From Corporate Systems: Study
Industry CMO on the Downstream Risks of "Logo Disclosures"
Intel Working on Patches for 8 New Spectre-Like Flaws: Report
NIST Updates Cybersecurity Framework to Tackle Supply Chain Threats,
Vulnerability Disclosure and More
Phone Maker BLU Settles with FTC Over Unauthorized User Data Extraction
Pr0nbot is Back - and Evading Twitter Censors
Report: Intel Facing New Spectre-Like Security Flaws
Samples of SiliVaccine Offer Rare Peek Inside North Korea's Antivirus
Software
Schneider Electric Patches Critical RCE Vulnerability
Tens of Thousands of Malicious Apps Using Facebook APIs
USB Sticks Can Trigger BSOD - Even on a Locked Device
Updated GravityRAT Malware Adds Advanced AV Detection
MassMiner Attacks Web Servers With Multiple Exploits
Microsoft Unveils New Solution for Securing Critical Infrastructure
NATO Exercise Tests Skills of National Cyber Defenders
North Korea Denies it Hacked UN Sanctions Committee Database
Over a Million Dasan Routers Vulnerable to Remote Hacking
PyRoMine Crypto-Miner Spreads via NSA-Linked Exploit
Researchers Link Several State-Sponsored Chinese Spy Groups
Why Network and Security Operations Centers Should be Doing More
Security Pros Not Confident in Endpoint Defense: Survey
Slack Releases Open Source Secure Development Lifecycle Tool