El Diario del CISO (The CISO Journal) Volumen 10 | Page 5

Volumen 10/2020 Gym app management platform exposed info of thousands of users Technology giant Konica Minolta hit by ransomware attack Malware, IT Issues Disrupt Distance Learning For Some IE Schools NCC Group admits its training data was leaked online after folders full of CREST pentest certification exam notes posted to GitHub Your mobile calls may be vulnerable to a new ReVoLTing eavesdrop attack Attack of the Instagram clones Phishing Emails Used to Deploy KONNI Malware With coronavirus vaccine, hackers morph into malware & phishing machines Researchers discovered significant vulnerability in Amazon's Alexa Data Is The New Perimeter North Korea-backed 'BeagleBoyz' group is targeting banks around the globe, US agencies warn More Microsoft Zero-Day Flaws Being Exploited How to secure vulnerable printers on a Windows network What is doxing? Weaponizing personal information The cybersecurity skills shortage is getting worse 'FritzFrog' P2P Botnet Targets SSH Servers Ransomware Payday: Average Payments Jump to $178,000 As Classes Resume, Schools Face Ransomware Risk New Zealand bourse crashes for fourth day after cyberattacks REvil ransomware operators hacked healthcare firm Valley Health Systems DarkSide Ransomware hits North American real estate developer Cybersecurity for Remote Workers: Keeping Financial Information Secure How to Spot—and Avoid—Dark Patterns on the Web Council Post: How To Defend Your Business In Today’s Cyber Cold War AI-enabled future crimes ranked: Deepfakes, spearphishing, and more This Ransomware Comes With Its Own Affiliate Program Unified Network Security: The need of the hour during Covid crisis Defense Establishment thwarts cyberattack targeting Israeli companies Researchers exploited a bug in Emotet malware to create a killswitch, containing its spread for six months Unsecured Database Exposed on Web - Then Deleted Addressing diversity in security What is threat hunting? Taking an active approach to defense BEC Scam Targets Executives' Office 365 Accounts IcedID Malware Revamped With Avoidance Capabilities Copycat Hacking Groups Launch DDoS Attacks More Ransomware Gangs Threaten Victims With Data Leaking 5