El Diario del CISO Volumen 5 | Page 9

Threatpost ' Olympic Destroyer ' Malware Behind Winter Olympics Cyberattack , Researchers Say Intel Expands Bug Bounty Program Post-Spectre and Meltdown Reported Critical Vulnerabilities In Microsoft Software On the Rise Researchers Find New Twists In ' Olympic Destroyer ' Malware
Romance Scams Drive Necurs Botnet Activity in Run Up to Valentine ' s Day
U . K . and U . S . Government Websites Among Thousands Infected by Cryptocurrency Miner
Unicode Technique Used to Deliver Cryptomining Malware Through Telegram
Word-based Malware Attack Doesn ' t Use Macros Computerweekly
After the Meltdown
SCMagazine
Confucius cybergang spreads backdoor ridden chat apps in Romance scams Drive-by cryptomining targeting millions of Android devices Edward Snowden returns to U . S .! Oops , nope , it ' s a phishing scam Olympics Malware attack may have been part of larger cyberespionage scheme
Pair of WordPress plug-ins inject malicious scripts to deliver unwanted ads
U . S . intel ponies up $ 100K to Russian operative for NSA hacking tools hawked by Shadow Brokers
Bleepingcomputer
All Five Eyes Countries Formally Accuse Russia of Orchestrating NotPetya
Criminals hijack government sites to mine cryptocurrency used to hide wealth
Attack
Cyber security awareness top priority in financial sector
Hacker Group Makes $ 3 Million by Installing Monero Miners on Jenkins
Servers
Cyberthreat 2018 aimed at UK cyber security techies
Olympic Destroyer Data-Wiping Malware Is More Complex Than Previously
Thought
Few organisations managing cyber risk , survey shows
Rapid Ransomware Being Spread Using Fake IRS Malspam
Industrial cyber security improving , but needs work
US sentences two Russians for huge data breaches
Wired
Forbes
2018 Worldwide Threats Briefing : 5 Takeaways , From Russia to China
6 Ways To Make Smart Cities Future-Proof Cybersecurity Cities
Cryptojacking Found in Critical Infrastructure Systems Raises Alarms
ATM ' Jackpotting ' Attacks Reveal Deeper Problems
White House Blames Russia for NotPetya , the ' Most Costly Cyberattack In
History '
Virtualizing Your Cybersecurity Team
Cshub
Tripwire
‘ Cyber Security ’ s Not An Install Process ’: Q & A With Kayne McGladrey
An Analog to Security and Compliance : The Wonder Twins
‘ Cyber Touches Everything ’: Innovation In The Security Domain
Security Mindset : Balancing Firmness and Flexibility
CSOAu
Databreachtoday
Time to Put Cyber-Security into Context
$
100,000 Fine in Case Involving Defunct Records Storage Firm

9