El Diario del CISO Volumen 10 | Page 5

Infosec expert viewpoint: IoT security initiatives Sharp rise in fileless attacks evading endpoint security What motivates bug hunters? SecurityWeek EMOTET Trojan Variant Evades Malware Analysis Risky Business: Understand Your Assets and Align Security With the Business GitHub Warns Developers When Using Vulnerable Libraries Terdot Banking Trojan Could Act as Cyber-Espionage Tool Middle East 'MuddyWater' Attacks Difficult to Clear Up Windows 10 Detects Reflective DLL Loading: Microsoft New Cyber Insurance Firm Unites Insurance With Cyber Intelligence WordPress Sites Exposed to Attacks by 'Formidable Forms' Flaws Ransomware Targets SMBs via RDP Attacks SecureList APT Trends report Q3 2017 Threat Predictions for Connected Health in 2018 Kaspersky Security Bulletin: Threat Predictions for 2018 Threat Predictions for Cryptocurrencies in 2018 Threat Predictions for Automotive in 2018 Threat Predictions for Financial Services and Fraud in 2018 ITSecurityGuru Data-Driven DDoS Defence Decision Making Eu Regulation, Skills And Governance Now Challenge Uk’s Leadership Of ‘Fourth Industrial Revolution’ Flowmon to address security challenges in SCADA/IoT environment NHS IT Managers Cite Prioritizing Cybersecurity as Essential to Improving Patient Trust and Care Security researchers in Vietnam have fooled Iphone X face ID security - cybersecurity experts have their say Should you fear the Reaper? Vectra 2018 Cyber Security predictions Securityaffairs 20 Million Google Home and Amazon Echo devices are affected by Millions of AI-based voice-activated personal assistants, including Google Home and Amazon Echo, are affected by the Blueborne flaws Multi-Stage Android/TrojanDropper.Agent.BKY Malware bypasses Google Play detection once again Terabytes of US military social media surveillance miserably left wide open in AWS S3 buckets Who is behind MuddyWater in Middle East? Likely a politically-motivated City of Spring Hill in Tennessee still hasn't recovered from ransomware attack - actor A new EMOTET Trojan variant improves evasion techniques BankInfoSecurity ETCISO How Information Sharing Helped Curtail WannaCry Harm cyber security: How to hack into one of the world's largest banks, thrice Researcher: McAfee URL Security Service Gave Pass to Trojan Cyber-diplomacy key component of global discourse: IT Minister 5