El Diario del CISO (The CISO Journal) Edición 8 2018 | Page 9
Kill Switch' to Mitigate Memcached DDoS Attacks — Flush 'Em All
APT Hackers Infect Routers to Covertly Implant Slingshot Spying Malware
ISPs Caught Injecting Cryptocurrency Miners and Spyware In Some Countries
Leaked NSA Dump Also Contains Tools Agency Used to Track Other Hackers
Memcached DDoS Exploit Code and List of 17,000 Vulnerable Servers
Released
New 4G LTE Network Attacks Let Hackers Spy, Track, Spoof and Spam
cyber crime: 33,531 cyber attacks in India in 2014-16
Cybersecurity remains largely untapped by women: Kaspersky Lab
Cybersecurity, AI top technologies for healthcare firms: Report
Data Protection: Evolving data protection needs of enterprises
Forcepoint introduced Human-Centric security innovations accelerate digital
transformation
GDPR: Less than 100 days for GDPR compliance deadline. Is your business
ready?
New Cryptocurrency Mining Malware Infected Over 500,000 PCs in Just Few
Managing the 6 obstacles for effective Cyber security program
Hours
Threatpost
Cryptomining Gold Rush: One Gang Rakes In $7M Over 6 Months
Cyber Espionage Campaign 'Slingshot' Targets Victims Via Routers
IoT Security Disconnect: As Attacks Spike, Device Patching Still Lags
Lookout: Dark Caracal Points To APT Actors Moving To Mobile Targets
Olympic Destroyer: A False Flag Confusion Bomb
POS Malware Found at 160 Applebee's Restaurant Locations
Security Camera Found Riddled With Bugs
Sofacy APT Adopts New Tactics and Far East Targets
Vulnerability in Robots Can Lead To Costly Ransomware Attacks
Computerweekly
Cooperation and exercises key to cyber defence, says Nato centre
Cryptojacking cyber criminals up their game
Cyber security is a team sport, says NCSC
Most Britons concerned about personal data sharing
Security Think Tank: How to tackle fileless malware attacks
UK government criticised over lack of GDPR explanation
ITsecurityguru
Bleepingcomputer
£820: All you're worth on the dark web to criminals
Coinminer Comes with a Process "Kill List" to Keep Competitors at Bay
ComboJack Trojan Replaces Cryptocurrency Addresses Copied to Windows
Aspiring cyber security professionals gain careers insight at Manchester Met
Clipboard
GandCrab Ransomware Version 2 Released With New .Crab Extension &
Cryptomining Rules Endpoints Around Me
Other Changes
It’s Time to Think Differently About Segmentation
Hackers, Not Users, Lose Money in Attempted Cryptocurrency Exchange Heist
Organisations must not ignore threat of coin mining malware, warns NTT
New DDoS Record Is Now 1.7 Tbps
Security
Spectre and Meltdown: Firmware flaws finally factor into security strategies Proof-of-Concept Code for Memcached DDoS Attacks Published Online
What is Strategic Threat Intelligence?
Technique Discovered That Can Mitigate Memcached DDoS Attacks
Bankinfosecurity
166 Applebee's Restaurants Hit With Payment Card Malware
Securelist
Mining is the new black
9