Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Information Security Risk Management: A Step-by-step Guide to a Clear Process

This post offers a comprehensive guide on managing information security risks, from pre-steps like asset identification to evaluation, treatment and monitoring. A crucial aspect given the surge of cyber vulnerabilities amid increasing tech advances.

article

21.3.2024

Ransomware, AI Act 101, NIST CSF 2.0: Cyberday product and news round up 3/2024 🛡️

In the March digest, development themes include new frameworks, risk management improvements and a new visual view for documentation cards. The news features Information Security Trailblazers, data breaches and AI Act 101.

article

21.3.2024

Empowering Employees: The Keystone in Incident Detection and Reporting

Employees are vital for detecting and reporting cyber threats and bolstering security. Proper training fosters a resilient culture, ensuring timely responses and safeguarding against breaches.

article

15.3.2024

Incident reporting in NIS2: Requirements and related ISO 27001 best practices

This post outlines NIS2 incident reporting and further describes ISO 27001 best practices, and their application in crafting successful incident reporting processes for your organization.

article

8.3.2024

Top 7 information security standards, frameworks and laws explained

Many information security frameworks are available to help organizations build their own security plans. This article provides key information about some of the most popular information security frameworks.

article

4.3.2024

ISO 27001 and NIS2: Understanding their Connection

Learn how the ISO 27001 and the NIS2 are "connected" and why they are brought up together pretty often. Understand their differences and synergy with the help of this blog post.

article

1.3.2024

Guide to Incident Detection and Reporting: Prepared for the Worst

In this guide you'll learn to navigate the incident detection and reporting process, explore various mechanisms, understand reporting, documentation, and derive crucial lessons. We also glance at other ingredients for successful incident management.

article

22.2.2024

NIS2 Overview: History, key contents and significance for top management

Get an overview of NIS2's main contents and understand how it makes top management clearly responsible for organization's information security efforts.

article

16.2.2024

Adobe revealed that the Magento Marketplace was hacked

Adobe discloses security breach impacting Magento Marketplace users Adobe discloses a security breach that affected the users of the Magento marketplace website, the incident was discovered last week. Adobe disclosed a security breach that affected the users of the Magento Marketplace portal, the security team discovered the incident on November 21. The Magento Marketplace is […]The post Adobe revealed that the Magento Marketplace was hacked appeared first on Security Affairs.

Go to article at
15.5.2020
Unpatched Vulnerabilities

Coronavirus-themed scams and attacks intensify

Scammers and other criminals are always quick to take advantage of crises, and this latest – centered around the spread of the deadly Covid-19 coronavirus around the world – is no exception. With the Western world conducting a considerable chunk of its day-to-day life online, with the help of computers, mobile phones and email, they are open to a variety of coronavirus-related cyber scams and schemes. A rising threat Aside from those who (legally) exploit … More → The post Coronavirus-themed scams and attacks intensify appeared first on Help Net Security.

Go to article at
15.5.2020
Phishing

Over 22,000 Vulnerabilities Disclosed in 2019: Report

More than 22,000 vulnerabilities were disclosed in 2019 and over one-third had an exploit or a proof-of-concept (PoC) available, Risk Based Security revealed on Tuesday. read more

Go to article at
15.5.2020
Unpatched Vulnerabilities

COVID Phishing Update – Insurance Coverage Lures

As COVID-19 cases have further spread over the past few weeks, our team has come across new lures that target an individual’s fear of coronavirus as it relates to their health insurance coverage. Both examples lead to malicious sites that attempt to steal Microsoft Office 365 login credentials. The post COVID Phishing Update – Insurance Coverage Lures appeared first on Security Boulevard.

Go to article at
15.5.2020
Phishing

Over half of organizations were successfully phished in 2019

Nearly 90 percent of global organizations were targeted with BEC and spear phishing attacks in 2019, reflecting cybercriminals’ continued focus on compromising individual end users, a Proofpoint survey reveals. Seventy-eight percent also reported that security awareness training activities resulted in measurable reductions in phishing susceptibility. The report examines global data from nearly 50 million simulated phishing attacks sent by Proofpoint customers over a one-year period, along with third-party survey responses from more than 600 information … More → The post Over half of organizations were successfully phished in 2019 appeared first on Help Net Security.

Go to article at
15.5.2020
Phishing

Is Universal Directory a Replacement for AD?

Whether Universal Directory works for you is ultimately up to your individual requirements, but any AD replacement needs certain capabilities.The post Is Universal Directory a Replacement for AD? appeared first on JumpCloud.The post Is Universal Directory a Replacement for AD? appeared first on Security Boulevard.

Go to article at
15.5.2020
Outdated Access Rights

Scammers siphon off $2.3 million from Texas school district in three transactions

Manor Independent School District (ISD) lost approximately $2.3 million in a phishing scam in three different fraudulent transactions. The scammers carried out the attacks in a variety of ways including disguised email addresses, phone numbers, fake links, etc. Located at a distance of about 15 miles from Austin, Texas, Manor ISD serves more than 9,600 students.

Go to article at
15.5.2020
Phishing

Fake Executive Tricks New York City Medical Center into Sharing Patient Info

An employee at a New York City medical center was tricked into giving out patient information by a threat actor purporting to be one of the facility's executives. In a Notice of Data Privacy Incident statement published on VCRN's website, the company stated: "The unauthorized actor requested certain information related to VCRN patients. Information obtained by the threat actor included first and last names, dates of birth, and medical insurance information, including provider name and ID number for 674 patients. The medical center said that they weren't aware of any personal patient information having been misused as a result of this event. VCRN has taken steps to notify all the patients who have potentially been impacted by the cyber-attack. VCRN advised patients "to remain vigilant against incidents of identity theft and fraud and to review account statements, credit reports, and explanation of benefits forms for suspicious activity and report any suspicious activity immediately to your insurance company, health care provider, or financial institution."

Go to article at
15.5.2020
Phishing

Pirated Software is All Fun and Games Until Your Data’s Stolen

Passwords stolen through software cracks BleepingComputer has been tracking adware bundles for a long time and in the past, they would install unwanted programs, but had no long-term ramifications to your data, privacy, or financial information. Security researcher Benkøw has recently noticed that monetized installers pretending to be software cracks and key generators are now commonly installing password-stealing Trojans or remote access Trojans (RATs) when they are executed. In his tests over the past week by downloading various programs promoted as game cheats, software key generators, and licensed software, when installing them he was infected with password-stealing Trojans and backdoors such as Dreambot, Glupteba, and Racoon Stealer. Distributed via torrent sites, YouTube, and fake crack sites To distribute these adware bundles, attackers will upload them to torrent sites, create fake YouTube videos with links to alleged license key generators, or create sites designed to just promote adware bundles disguised as software cracks.

Go to article at
15.5.2020
Malware