El Diario del CISO El Diario del CISO (The CISO Journal) Edición 9 | Page 6

News0 EL DIARIO DEL CISO (THE CISO JOURNAL) Thinking and Working for a Digital Security Leader International InfoSec & Cybersecurity News How a Chinese Nation-State Group Reverse-Engineered NSA Attack Tools New Symantec research shows how the Buckeye group captured an exploit and backdoor used by the National Security Agency and deployed them on other victims. 'Matrix'-Themed Ransomware Variant Spreads 8 Personality Traits for Cybersecurity Better Behavior, Better Biometrics? Credit Card Compromise Up 212% as Hackers Eye ... Data Dump Purportedly Reveals Details on Previously ... Docker Forces Password Reset for 190,000 Accounts ... FBI: Cybercrime Losses Doubled in 2018 How Storytelling Can Help Keep Your Company Safe How the Skills Gap Strains - and Constrains - ... How to Close the Critical Cybersecurity Talent Gap How to Help Your Board Navigate Cybersecurity's ... How We Collectively Can Improve Cyber Resilience Misconfigured Ladders Database Exposed 13M User Records New Initiative Aims to Fast-Track Women into ... Orgs Are Quicker to Disclose Breaches Reported to ... Password Reuse, Misconfiguration Blamed for ... Peer-to-Peer Vulnerability Exposes Millions of IoT ... Russian Nation-State Group Employs Custom Backdoor ... Security Doesn't Trust IT - and IT Doesn't Trust ... Security Top Concern as Mobile Providers Think 5G Social Engineering Slams the C-Suite: Verizon DBIR Study Exposes Breadth of Cyber Risk The Big E-Crime Pivot The Dark Web Is Smaller Than You Think The Fine Line of Feedback: 6 Tips for Talking to ... Trust the Stack, Not the People US DoJ Indicts Chinese Man for Anthem Breach US States with the Worst Consumer Cyber-Hygiene Why Are We Still Celebrating World Password Day? Simplifying Cyber security Deployments with Automation – Cyber Defense Magazine Security is a whole lot like quantum mechanics. It’s rife with uncertainty and you can’t observe your infrastructure without affecting it. 4 Signs Your Organization is a Good Cyber Attack Target, and What to Do about It 8 Cyber security Practices In Health IT Domain That Every Company Should Learn From Cutting Through the Hype-The Realistic Flaws of a Zero Trust Security Model Enterprise Insider Threats on the Rise On Security and Privacy, States Are Taking the Lead SOAR: The Key to Building a Trustworthy Iot The Internet of Things Signal Transmission Challenges Your Security Teams are Destroying Critical Evidence Zero Trust Security Five Red Flags You Have a Cyber Security Insights Problem Top Russian Hacking Group Breaches Three AV Companies - Infosecurity Magazine A report published today by Advanced Intelligence revealed that three US-based antivirus software vendors have been breached, and a high-profile collective of Russian hackers is claiming responsibility #Belfast2019: Cybersec Industry to Generate £70m+ in Salaries in Northern Ireland Baltimore Severs Down After Ransomware Attack C-Suite Under Attack as Money and Data Drive Breaches Canadian Telco Exposes Unencrypted Card Details Cyber-Attacks in UK Grew by 140% in 2018 DHS Releases Analysis of ELECTRICFISH Malware Europol: Two More Dark Web Marketplaces Have Been Seized Fin7 APT Targets Over 130 Orgs after Leader's Arrest Hackers Steal 7K BTC from Binance Cryptocurrency Holiday Scammers Made £7m in 2018 Israel Responds to Cyber-Attack with Air Strike Major Uptick in IoT-Related Breaches and Attacks Matrix-Themed Ransomware MegaCortex Spikes in May Most Firms Rely on Trust Alone for Supply Chain Security New Magecart Group Steals Data from 201 Campus E-Stores Only 0.25% of Reported Data Breaches Have Led to Fines Since GDPR Orange Gains SecureLink, Advances Cyber Offerings Russia Uses Social Media to Sway Public Opinion Ukrainian Faces US Charges for Five-Year Malvertising Campaign Websites Continue to Collect PII Data Insecurely 50,000 companies running SAP installations open to attack via publicly released exploits - Help Net Security Two exploits publicly released in late April at the OPCDE security conference in Dubai could be leveraged to compromise a great number of SAP implementation 3 months, 1900 reported breaches, 1.9 billion records exposed 60% of businesses have experienced a serious security breach in the last two years Bad actors increasingly spreading misinformation via social media ahead of EU elections C-level executives increasingly and proactively targeted by social breaches C-Suite execs and policy makers find cybersecurity technology investments essential Consumers care deeply about their privacy, security, and how their personal information is handled Cybercriminals targeting social media: Facebook and Instagram are becoming phishers’ favorites How institutions, advisors, and investors think about digital assets Is curiosity killing patient privacy? Most SMBs would pay a ransom in order to recover stolen data Network as a Service market to exceed $50bn by 2025 Researchers discover highly stealthy Microsoft Exchange backdoor Securing satellites: The new space race The IoT threat landscape is expanding rapidly, yet few companies are addressing third party risk factors The leading sources of stress for cybersecurity leaders? Regulation, threats, skills shortage Trust is at a tipping point: Consumers will react strongly if they feel their privacy is compromised Unhackable? New chip makes the computer an unsolvable puzzle What differentiates the strongest cybersecurity programs from the rest Whose (usage) data is it, anyway?