Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

This article provides an insight into the main responsibilities of a CISO, from implementing security principles to fostering collaboration. It also presents valuable tips for successful performance, emphasizing constant learning as a key ingredient.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

article

15.12.2023

Working towards NIS2 compliance with Cyberday

✈️ You want to lift your cyber security management to a new level & get NIS2 compliant with a smart tool like Cyberday? In this post you'll learn how your organization can achieve NIS2 compliance in a smart way by building an own agile ISMS.

article

23.8.2023

Who does NIS2 apply to? Scope and required security measures explained.

In this post you'll learn about what industries are affected by NIS2, security requirements the directive sets, and the available enforcement methods if an organization is not compliant.

article

23.8.2023

What is NIS2 directive? Know EU's new cyber security legislation

Learn about the background and reasons behind the EU's new Network and Information Security 2 (NIS2) Directive. How does it affect your company and how should you react to be compliant?

article

1.8.2023

5 Common Cybersecurity Threats Businesses Face

The best way for businesses to protect against these 5 common threats is to have a comprehensive set of security tools in place, and to train employees and also monitor their activities.

Go to article at
15.5.2020
CyberNow

Ransomware Attack Hits Major US Data Center Provider

CyrusOne, one of the biggest data center providers in the US, has suffered a ransomware attack, ZDNet has learned. FIA Tech, a financial and brokerage firm, has informed customers today that an outage of their respective cloud services originated at their data center provider. FIA Tech did not name the data center provider, but a quick search identified it as CyrusOne. In a message to customers, FIA Tech said "the attack was focused on disrupting operations in an attempt to obtain a ransom from our data center provider." A source has told ZDNet today that the incident has not impacted all of CyrusOne's data centers, but that restoring servers and customer data will be a lengthy process. The company owns 45 data centers in Europe, Asia, and the Americas, and has more than 1,000 customers.

Go to article at
15.5.2020
Ransomware

Ransomware Victim Southwire Sues Maze Operators

Attackers demanded $6 million from the wire and cable manufacturer when they launched a December ransomware campaign.

Go to article at
15.5.2020
Ransomware

43% of IT professionals are still tracking assets in spreadsheets

43% of IT professionals report using spreadsheets as one of their resources for tracking assets, according to Ivanti. Further, 56% currently do not manage the entire asset lifecycle, risking redundant assets, potentially creating a risk, and causing unnecessary and costly purchases. Findings from the survey demonstrate the need for greater alignment between ITSM and ITAM processes, especially when looking at the time spent reconciling inventory/assets. Nearly a quarter of respondents reported spending hours per week … More → The post 43% of IT professionals are still tracking assets in spreadsheets appeared first on Help Net Security.

Go to article at
15.5.2020
Employee Negligence

New Chrome Password Stealer Sends Stolen Data to a MongoDB Database

While this is nothing unique, what stands out is that the malware uses a remote MongoDB database to store the stolen passwords. This trojan is called CStealer, and like many other info-stealing trojans, was created to target and steal login credentials that were saved in Google Chrome's password manager. Instead of compiling the stolen passwords into a file and sending them to a C2 under the attackers control, the malware connects directly to a remote MongoDB database and uses it to store the stolen credentials. To do this, the malware includes hardcoded MongoDB credentials and utilizes the MongoDB C Driver as a client library to connect to the database. Hardcoded MongoDB Credentials When passwords are stolen, the malware will connect to the database and store the passwords as seen by the network traffic created after it was tested by James. Anyone analyzing this malware, whether it be law enforcement, researchers, or other threat actors, can retrieve the hard coded credentials and use them to gain access to the stolen credentials.

Go to article at
15.5.2020
Malware

Netflix account freeze – don’t click, it’s a scam!

The telltale signs are all there... but if you're in a hurry, this Netflix scam passes the "visual appeal" test.

Go to article at
15.5.2020
Phishing

New Targets Found from BEC Scammers Using Phishing

A group tracked as Ancient Tortoise is targeting accounts receivable specialists tricking them into sending over aging reports and thus collecting info on customers they can scam in later attack stages. Aging reports (aka schedule of accounts receivable) are collections of outstanding invoices designed to help a company’s financial department to keep track of customers who […] The post New Targets Found from BEC Scammers Using Phishing appeared first on IT Security Guru.

Go to article at
15.5.2020
Business-Email-Compromise

Connecticut School District Offline After Cyberattack

Fiscal data and student data is stored remotely — not part of the school network — so that data wasn’t affected, Director of Innovation, Technology and Communications Karen Kaplan said. Schools have remained in session since the attack and staff have been allowed to use their devices offline. The administration sent a voice message to parents and posted it on the school website that schools should be contacted by phone and not email until the issue is resolved. “What’s most important to us is we have no reason to believe that any student data was stolen or that any student data was accessed in any way,” Kaplan said. The schools use many online services, which will be down until the end of next week or longer, Kaplan said, but then schools will be brought back one at a time as each device is individually cleaned. Kaplan said the district has tried to teach staff to recognize phishing emails and since the attack they’ve asked administrators to review protocol for when suspicious emails are received by staff.

Go to article at
15.5.2020
Malware

How cybercriminals are using Microsoft Sway to launch phishing attacks

Attackers are creating phishing sites from Sway, an effective approach as links for the domain are typically trusted, says security firm Avanan. However, even if your organization doesn't use this software, you can still be vulnerable to phishing attacks that are hosted from Sway, according to Avanan. Since the pages are hosted on Microsoft's own Sway domain, the pages and their links are automatically trusted by URL filters and can easily fool users into thinking they're valid. To convince potential victims to access a malicious Sway phishing page, cybercriminals will send emails with notifications for voicemails or faxes, hoping that unsuspecting users will click on the link or image. Microsoft itself trusts the Sway and Office domains, so this URL will sneak past Safe Link settings. This type of phishing attack can succeed because it sends users to a trusted page hosted by Microsoft rather than a compromised website that would likely be blocked by web browsers and blacklists.

Go to article at
15.5.2020
Phishing