El Diario del CISO (The CISO Journal) Edición 8 2018 | Page 10

Bankshot Trojan Targets Turkish Financial Sector
Mobile malware evolution 2017
Memcached DDoS Attacks : 95,000 Servers Vulnerable to Abuse
OlympicDestroyer is here to trick the industry
Putin Offers Extradition Promise to US : ' Never '
The devil ' s in the Rich header
Top US General : Response to Russia Not Unified
Ukraine Sentences Two Citizens For DDoS Extortion Campaigns
Techrepublic
Securereading
5 easy ways to keep yourself cybersecure at work
4G LTE ENDANGERED WITH VULNERABILITIES ! HOW ABOUT 5G ?
Bad user practices caused 41 % of medical IoT security issues in 2017
FlawedAmmyy RAT Targets Users via Massive Email Campaigns
How global CXOs can improve their security posture : 6 tips
Triada Banking Trojan Found on 42 Models of Low-Cost Android Smartphones
New cryptojacking attack uses WannaCry exploit to mine on Windows
servers
Nakedsecurity
Infosecinstitute
“ Big Bitcoin Heist ” sees 600 Icelandic servers stolen
7 Common Penetration Testing Mistakes
Cryptomining versus cryptojacking – what ’ s the difference ?
Top 6 Mobile Application Penetration Testing Tools
How women are helping to fight cybercrime
Securityintelligence
Securityledger
Mobile Banking Trojans as Keen on Cryptocurrency as PC Malware
China caught pushing Vulnerability Reporting Delays down the Memory Hole
Seize the Day : Celebrating Women in Security
No Teeth in UK Internet of Things Security Report
Gbhackers
Healthcareinfosecurity
In a Single Night Cybercriminal Gang stole 3.8 million slopes (€ 860,000 ) from
Breach Alert Service : UK , Australian Governments Plug In
32 ATMs
Powerful APT Malware “ Slingshot ” Performs Highly Sophisticated Cyber
Attack to Compromise Router
Why Ransomware Attacks Are a Security Wake-Up Call
Techradar
Securitybrief
Here ' s the monthly cybersecurity audit you should be carrying
Microsoft explores Australian CISOs ' most common problems in cybersecurity
These are the most influential people in cybersecurity right now
What cyber security needs to go beyond the network
ScmagazineUK
Cnet
Hackers using blockchain to keep authorities at bay & to sustain operations
Bitcoin value plunges after SEC cryptocurrency exchange warning
Hospitality industry is key infosec battleground
National security concerns may derail Broadcom bid for Qualcomm
Malwarebytes
Wired
Building an incident response program : creating the framework
Leaked NSA Tool ' Territorial Dispute ' Reveals the Agency ' s List of Enemy
Hackers

10