El Diario del CISO (The CISO Journal) Edición 15 | Page 7

Threatpost Securityweek InformationSecuritybuzz
NEW REGULATION: NIS Directive Will Ensure The UK Remains‘ On’ During The
‘ More Exposed Than Ever’ – Businesses Not Ready For Another WannaCry
Most Extreme Cyber-Attacks
42 % Of IT Professionals Ignore Critical Security Flaws
New Version Of The Hide And Seek Botnet Can Now Survive Device Reboots
Alarm Fatigue And The Danger To Cybersecurity
NHS WannaCry: One Year On
Critical Windows Vulnerabilities Exploited By Hackers Now Patched In
Microsoft May 2018 Updates
Oracle Access Manager Vulnerability
One Year After WannaCry: What ' s Changed & What Hasn ' t?( May 12 Marks
One Year)
Security Professionals Prefer Shorter Vulnerability Disclosure Timelines
Estimated DDoS IoT Costs
Tax fraud: Why Human Nature Leaves Data Vulnerable To Hackers
Facebook Scandal – A Call To Be More Vigilant About Your Privacy
Telegram: The New Channel Of Choice For Conducting Cyber-Crime
The Importance Of Long-Term Compliance And Tackling Data Sprawl, And The
GDPR Compliance Countdown: The Final Checklist
Impact GDPR Will Have On Company Culture
Hackers Using Stolen Credentials To Tap Travel Rewards
Twitter Password
Uber To Resume Tests With Self-Driving Cars, Just A Few Months After Fatal
Hacking Gang Turns To New Tactics In Malware Campaign
Crash
UK Manufacturing Is Top Target For Cyber Attackers – NTT Security 2018
HMRC Issue Phishing Warning
Global Threat Intelligence Report
Are You Securing Your Contract Workforce?
Phishers Use New Method to Bypass Office 365 Safe Links
Critical Code Execution Flaw Patched in Flash Player
Romanian Who Attacked Warcraft Gets Year in Prison
Cyber Insurance Startup At-Bay Raises $ 13 Million
Romanians Charged With Vishing, Smishing Extradited to U. S.
Facebook ' s Growing Privacy Concern
Russia-linked Hackers Exploit Lojack Recovery Tool in Attacks
Google Releases Additional Meltdown Mitigations for Android
SafeBreach Raises $ 15 Million in Series B Funding
How Digital Transformation is Making the Anonymous Personal
SynAck Ransomware Uses Process Doppelgänging for Evasion
Microsoft Patches Two Windows Zero-Day Vulnerabilities
The ABCs Driving the Growth of Industrial Cybersecurity
Misinterpretation of Intel Docs Leads to Flaw in Hypervisors, OSs
The GDPR Opportunity
No Evidence Russian Hackers Changed Votes in 2016 Election: Senators
The Impending Facial Recognition Singularity
The Solution to the Cybersecurity Talent Gap is Inclusion
The Multiplier Effect of Collaboration for Security Operations
Equi-Facts: Equifax Clarifies the Numbers for Its Massive Breach Adobe Patches Critical Bugs In Flash Player, Creative Cloud Bugs in Logitech Harmony Hub Put Connected IoT Devices at ' High Risk ' Cryptojacking Campaign Exploits Drupal Bug, Over 400 Websites Attacked Variant of SynAck Malware Adopts Doppelgänging Technique
May Patch Tuesday Fixes Two Bugs Under Active Attack New Facebook-Spread Malware Triggers Credential Theft, Cryptomining Nigerian BEC Scammers Growing Smarter, More Dangerous
Romanian
Hackers Extradited to U. S. over $ 18M Vishing Scam Secrets of the Wiper: Inside the World ' s Most Destructive Malware