El Diario del CISO Volumen 4 - 2018 | Page 10

New Monero Crypto Mining Botnet Leverages Android Debugging Tool
Study claims most businesses lack cyber expertise to prevent attacks
Krebsonsecurity
Infosecinstitute
Alleged Spam Kingpin ‘ Severa ’ Extradited to US
4 Factors to Consider When Calculating the Cost of a Data Breach
U . S . Arrests 13 , Charges 36 in ‘ Infraud ’ Cybercrime Forum Bust
A 10 Step Post-Breach Incident Response Checklist
Would You Have Spotted This Skimmer ?
Cryptocurrency mining botnets on the rise
Securityintelligence
Malwarebytes
Industrial Control Systems Storm the Internet , Increase Corporate Risk
Bank robbers 2.0 : digital thievery and stolen cryptocoins
Lessons From the World Economic Forum ' s Cyber Resilience Playbook
Boomerang spam bombs Malwarebytes forum — not a smart move
The Expanding Role of the CISO : Seven Attributes of a Successful Security
Leader
New Mac cryptominer has 23 older variants
Nakedsecurity
Radware
iOS ‘ iBoot ’ source code posted online , Apple issues DMCA takedown notice
ADB Miner : A New Botnet Surfaces
Robot ’ s revenge – the CAPTCHA that stops humans
DarkSky Botnet
Theguardian
CISCO
EU data protection law may end up protecting scammers , experts warn
An Industry-First : A Better Framework for Cyber Risk
Every NHS trust tested for cybersecurity has failed , officials admit
The Role of Transparency in our Digital Economy
Shawnetuma
Eweek
Uber CISO ’ s Testimony Clarifies Payment to Hackers was Not Legitimate Use of Bug Bounty Program
Industry Reports Reveal that Cyber-Security Threats are Growing
What is “ reasonable cybersecurity ” and how do courts view it ?
Water Utility in Europe Hit by Cryptocurrency Malware Mining Attack
Trendmicro
Thalessecurity
Detecting New Threats via Contextual Information and Reputation
Digital Transformation starts with the Employees
How hackers recycle top threats
Three Strategies for Big Data Security
Cyberdefensemagazine
More than 1 million worth of ETH stolen from Bee Token ICO Participants with phishing emails
Special Report : How to Prepare Your Organization for a Security Incident
Simple News
A web that ' s truly wide : Canadian Institute of Cybersecurity
www . macleans . ca
About Security Culture - Think Research Expose
thedailyjournalist . com
Advice from a CISO : It ’ s time to stop fearing cloud security
www . idgconnect . com
AI ' s Future Role in Cybersecurity
www . esecurityplanet . com
Apple ’ s iOS source code leak – what you need to know
hotforsecurity . bitdefender . com

10