El Diario del CISO (The CISO Journal) Volumen 10 | Page 5
Volumen 10/2020
Gym app management platform exposed info of
thousands of users
Technology giant Konica Minolta hit by
ransomware attack
Malware, IT Issues Disrupt Distance Learning For
Some IE Schools
NCC Group admits its training data was leaked
online after folders full of CREST pentest
certification exam notes posted to GitHub
Your mobile calls may be vulnerable to a new
ReVoLTing eavesdrop attack
Attack of the Instagram clones
Phishing Emails Used to Deploy KONNI Malware
With coronavirus vaccine, hackers morph into
malware & phishing machines
Researchers discovered significant vulnerability in
Amazon's Alexa
Data Is The New Perimeter
North Korea-backed 'BeagleBoyz' group is
targeting banks around the globe, US agencies
warn
More Microsoft Zero-Day Flaws Being Exploited
How to secure vulnerable printers on a Windows
network
What is doxing? Weaponizing personal information
The cybersecurity skills shortage is getting worse
'FritzFrog' P2P Botnet Targets SSH Servers
Ransomware Payday: Average Payments Jump to
$178,000
As Classes Resume, Schools Face Ransomware Risk
New Zealand bourse crashes for fourth day after
cyberattacks
REvil ransomware operators hacked healthcare firm
Valley Health Systems
DarkSide Ransomware hits North American real
estate developer
Cybersecurity for Remote Workers: Keeping
Financial Information Secure
How to Spot—and Avoid—Dark Patterns on the
Web
Council Post: How To Defend Your Business In
Today’s Cyber Cold War
AI-enabled future crimes ranked: Deepfakes,
spearphishing, and more
This Ransomware Comes With Its Own Affiliate
Program
Unified Network Security: The need of the hour
during Covid crisis
Defense Establishment thwarts cyberattack
targeting Israeli companies
Researchers exploited a bug in Emotet malware to
create a killswitch, containing its spread for six
months
Unsecured Database Exposed on Web - Then
Deleted
Addressing diversity in security
What is threat hunting? Taking an active approach
to defense
BEC Scam Targets Executives' Office 365 Accounts
IcedID Malware Revamped With Avoidance
Capabilities
Copycat Hacking Groups Launch DDoS Attacks
More Ransomware Gangs Threaten Victims With
Data Leaking
5