El Diario del CISO Volumen 5 | Page 8

Chat app Telegram is tricking users into installing cryptomining malware Cryptomining malware spread via US, UK and Australian government sites Cyber peacekeeping: A cyberwar issue businesses need to consider now How Trojans steal credentials and attack cloud services New Spectre, Meltdown variants leave victims open to side-channel attacks BankInfoSecurity Aetna Breach Case Gets Messier Criminals Hide 'Billions' in Cryptocurrency, Europol Warns Cryptocurrency Miners: How to Shield Browsers From Bad Guys Hackers Win Olympic Gold Medal for Disruption How IoT Affects the CISO's Job Russia's Election Meddling: CIA Offensive at the Ready Russian Indictments: 'It's About Time' The Convergence of Healthcare Innovation and Compliance US Indicts 13 Russians for Election Interference WhatsApp’s New Payment Service Leverages NCPI’s UPI Russian engineers arrested for mining cryptocurrency with office supercomputer Security nightmares: These 3 threats keep CISOs up at night Tech leaders sign charter to boost cybersecurity in business and government This one business file is most used in cyberattacks Securityweek Cryptocurrency Miners Not Uncommon on Industrial Systems Exploring a New Reference Architecture for Industrial Control Systems Security Global Powers Must Address 'Episodes of Cyberwar': UN Chief Litecoin, Dash to Dethrone Bitcoin on Dark Web: Report Over $100,000 Paid Out in 'Hack the Air Force 2.0' Researchers Warn Against Knee-Jerk Attribution of 'Olympic Destroyer' Attack Security Awareness Training Top Priority for CISOs: Report U.K. Officially Blames Russia for NotPetya Attack U.S. Energy Department Announces Office for Cyber, Energy Security U.S. Government Contractors Score Poorly on Cyber Risk Tests ITSecurityguru ETCISO 2018 Winter Olympics: Citius, Altius, Fortius, Cyber Attacks? British businesses spreading cryptocurrency risk – 93% of companies stockpiling Bitcoin have invested in additional digital currencies Gartner Provides Seven Steps Security Leaders Can Take to Deal With Spectre and Meltdown GDPR – Burden or Benefit? How cryptojacking came to be, what to watch out for, and how Citrix can help you avoid it like the plague! Less than 1 in 5 enterprises have a customer notification plan in place in the event of a data breach Research reveals increasing number of Microsoft vulnerabilities shows no sign of stopping Security obsession risks GDPR compliance for UK business The Destructive nature of North Korean Cyber-Attacks 1.5 lakh online transactions get compromised in India' cryptocurrency: Hackers are using your phones, computers to mine a cryptocurrency Data Protection officers: Why data protection officers are suddenly the hottest tech ticket in the town Hackers stole $6 million in attack on SWIFT system, Russian central bank says Kim Jong-un: Hacking is an ‘asymmetric strategy' of Kim Jong-un to target adversaries Ransomware, malvertising adware continue to deploy organisations worldwide: Report Russia says hackers stole more than $17 million from its banks in 2017 Why your privacy is a precursor to your security 8