El Diario del CISO (The CISO Journal) Edición 8 2018 | Page 9

Kill Switch' to Mitigate Memcached DDoS Attacks — Flush 'Em All APT Hackers Infect Routers to Covertly Implant Slingshot Spying Malware ISPs Caught Injecting Cryptocurrency Miners and Spyware In Some Countries Leaked NSA Dump Also Contains Tools Agency Used to Track Other Hackers Memcached DDoS Exploit Code and List of 17,000 Vulnerable Servers Released New 4G LTE Network Attacks Let Hackers Spy, Track, Spoof and Spam cyber crime: 33,531 cyber attacks in India in 2014-16 Cybersecurity remains largely untapped by women: Kaspersky Lab Cybersecurity, AI top technologies for healthcare firms: Report Data Protection: Evolving data protection needs of enterprises Forcepoint introduced Human-Centric security innovations accelerate digital transformation GDPR: Less than 100 days for GDPR compliance deadline. Is your business ready? New Cryptocurrency Mining Malware Infected Over 500,000 PCs in Just Few Managing the 6 obstacles for effective Cyber security program Hours Threatpost Cryptomining Gold Rush: One Gang Rakes In $7M Over 6 Months Cyber Espionage Campaign 'Slingshot' Targets Victims Via Routers IoT Security Disconnect: As Attacks Spike, Device Patching Still Lags Lookout: Dark Caracal Points To APT Actors Moving To Mobile Targets Olympic Destroyer: A False Flag Confusion Bomb POS Malware Found at 160 Applebee's Restaurant Locations Security Camera Found Riddled With Bugs Sofacy APT Adopts New Tactics and Far East Targets Vulnerability in Robots Can Lead To Costly Ransomware Attacks Computerweekly Cooperation and exercises key to cyber defence, says Nato centre Cryptojacking cyber criminals up their game Cyber security is a team sport, says NCSC Most Britons concerned about personal data sharing Security Think Tank: How to tackle fileless malware attacks UK government criticised over lack of GDPR explanation ITsecurityguru Bleepingcomputer £820: All you're worth on the dark web to criminals Coinminer Comes with a Process "Kill List" to Keep Competitors at Bay ComboJack Trojan Replaces Cryptocurrency Addresses Copied to Windows Aspiring cyber security professionals gain careers insight at Manchester Met Clipboard GandCrab Ransomware Version 2 Released With New .Crab Extension & Cryptomining Rules Endpoints Around Me Other Changes It’s Time to Think Differently About Segmentation Hackers, Not Users, Lose Money in Attempted Cryptocurrency Exchange Heist Organisations must not ignore threat of coin mining malware, warns NTT New DDoS Record Is Now 1.7 Tbps Security Spectre and Meltdown: Firmware flaws finally factor into security strategies Proof-of-Concept Code for Memcached DDoS Attacks Published Online What is Strategic Threat Intelligence? Technique Discovered That Can Mitigate Memcached DDoS Attacks Bankinfosecurity 166 Applebee's Restaurants Hit With Payment Card Malware Securelist Mining is the new black 9