El Diario del CISO Volumen 7 | Page 5

Data-driven analysis of vulnerabilities in real-world OT networks Third-party risk management: Moving toward centralized, automated systems Critical flaws in maritime comms system could endanger entire ships Infosec expert viewpoint: DDoS attacks Offshore law firm Appleby confirms data breach Lending industry faces higher fraud costs than e-commerce, retail and financial services Researchers turn LG's Hom-Bot vacuum cleaner into a real-time spying device ETCISO New cyber attacks hit airport, metro in Ukraine New wave of cyber attacks hits Russia, other nations cyber crime: Think your email conversations are safe? Then you haven't heard of FreeMilk cyber attacks: Almost 2bn data records breached in 2017 Nasdaq sues operators of cyber security ETF, alleging theft NotPetya hackers likely behind BadRabbit attack: Research HealthCareInfoSecurity The Next IoT Botnet Has Improved on Mirai Is Digital Transformation a Security 'Disaster'? How a Medical Device Vulnerability Can Compromise Privacy Understanding the Malware-as-a-Service Commodity Market BadRabbit Attack Appeared To Be Months In Planning Forbes A Massive Number Of IoT Cameras Are Hackable -- And Now The Next Web Crisis Looms The DDoS Attack Against Dyn One Year Later Cyberattacks Are Inevitable -- Until We Stop Playing The Blame Game Examining The Three Classes Of Cybersecurity Needs Threarpost Hackers Prepping IOTroop Botnet with Exploits Bad Rabbit Linked to ExPetr/Not Petya Attacks EternalRomance Exploit Found in Bad Rabbit Ransomware Ursnif Banking Trojan Spreading In Japan Security Now Ways to Win the Security Skills Challenge Bad Rabbit Breeds Ransomware Fears A New BotNet Is Growing: Are You Already Part of Its Army? Securityweek Five People Who Can Benefit from Thinking about Intelligence Differently The Ten Cybersecurity Commandments UK Blames North Korea for Cyberattack That Crippled Hospitals Security Intelligence Bad Rabbit Ransomware Outbreak Highlights Risk of Propagating Malware Disasters Locky Ransomware Attacks Exploit Microsoft DDE to Increase Effectiveness 5