El Diario del CISO (The CISO Journal) Edición 15 | Page 7

Threatpost Securityweek InformationSecuritybuzz
NEW REGULATION : NIS Directive Will Ensure The UK Remains ‘ On ’ During The
‘ More Exposed Than Ever ’ – Businesses Not Ready For Another WannaCry
Most Extreme Cyber-Attacks
42 % Of IT Professionals Ignore Critical Security Flaws
New Version Of The Hide And Seek Botnet Can Now Survive Device Reboots
Alarm Fatigue And The Danger To Cybersecurity
NHS WannaCry : One Year On
Critical Windows Vulnerabilities Exploited By Hackers Now Patched In
Microsoft May 2018 Updates
Oracle Access Manager Vulnerability
One Year After WannaCry : What ' s Changed & What Hasn ' t ? ( May 12 Marks
One Year )
Security Professionals Prefer Shorter Vulnerability Disclosure Timelines
Estimated DDoS IoT Costs
Tax fraud : Why Human Nature Leaves Data Vulnerable To Hackers
Facebook Scandal – A Call To Be More Vigilant About Your Privacy
Telegram : The New Channel Of Choice For Conducting Cyber-Crime
The Importance Of Long-Term Compliance And Tackling Data Sprawl , And The
GDPR Compliance Countdown : The Final Checklist
Impact GDPR Will Have On Company Culture
Hackers Using Stolen Credentials To Tap Travel Rewards
Twitter Password
Uber To Resume Tests With Self-Driving Cars , Just A Few Months After Fatal
Hacking Gang Turns To New Tactics In Malware Campaign
Crash
UK Manufacturing Is Top Target For Cyber Attackers – NTT Security 2018
HMRC Issue Phishing Warning
Global Threat Intelligence Report
Are You Securing Your Contract Workforce ?
Phishers Use New Method to Bypass Office 365 Safe Links
Critical Code Execution Flaw Patched in Flash Player
Romanian Who Attacked Warcraft Gets Year in Prison
Cyber Insurance Startup At-Bay Raises $ 13 Million
Romanians Charged With Vishing , Smishing Extradited to U . S .
Facebook ' s Growing Privacy Concern
Russia-linked Hackers Exploit Lojack Recovery Tool in Attacks
Google Releases Additional Meltdown Mitigations for Android
SafeBreach Raises $ 15 Million in Series B Funding
How Digital Transformation is Making the Anonymous Personal
SynAck Ransomware Uses Process Doppelgänging for Evasion
Microsoft Patches Two Windows Zero-Day Vulnerabilities
The ABCs Driving the Growth of Industrial Cybersecurity
Misinterpretation of Intel Docs Leads to Flaw in Hypervisors , OSs
The GDPR Opportunity
No Evidence Russian Hackers Changed Votes in 2016 Election : Senators
The Impending Facial Recognition Singularity
The Solution to the Cybersecurity Talent Gap is Inclusion
The Multiplier Effect of Collaboration for Security Operations
Equi-Facts : Equifax Clarifies the Numbers for Its Massive Breach Adobe Patches Critical Bugs In Flash Player , Creative Cloud Bugs in Logitech Harmony Hub Put Connected IoT Devices at ' High Risk ' Cryptojacking Campaign Exploits Drupal Bug , Over 400 Websites Attacked Variant of SynAck Malware Adopts Doppelgänging Technique
May Patch Tuesday Fixes Two Bugs Under Active Attack New Facebook-Spread Malware Triggers Credential Theft , Cryptomining Nigerian BEC Scammers Growing Smarter , More Dangerous
Romanian
Hackers Extradited to U . S . over $ 18M Vishing Scam Secrets of the Wiper : Inside the World ' s Most Destructive Malware