Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Spreadsheet vs. ISMS tool - top 10 reasons why a tool is better than the traditional way

Discover the top 10 reasons why agile tools outperform traditional spreadsheets in managing cyber security compliance, from centralized management to continuous improvement.

article

22.8.2024

ISMS Essentials: Mastering a Data System Inventory for Your Organization

This post provides essential insights for maintaining a data system inventory within your organization's ISMS, detailing key processes, asset types, and tackling common challenges.

article

15.8.2024

Incident Detection: Building, Nurturing, and Continuously Improving a Proactive Environment

Shift from reactive to proactive incident detection. Use advanced tools, continuous learning, and customised strategies to anticipate and prevent issues. Focus on constant improvement and innovation to boost security and resilience.

article

15.8.2024

ISO 27001 and ISO 9001: Differences, how they work together and benefits of combining

Learn about the synergy between ISO 27001 and ISO 9001. Learn how integrating these standards enhances information security, quality management, and overall operational efficiency, using case examples and actionable insights.

article

6.6.2024

NIS2 Compliance: Top 5 Reasons for the Manufacturing Sector

The article highlights the critical importance for manufacturers to comply with NIS2 regulations to safeguard their operations and infrastructure from cyber threats.

article

31.5.2024

Cannes Hospital data breach, the impact of AI and NIS2 evolution: the Cyberday product and news round-up 5/2024 🛡️

May's Product and News Update presents the new monthly ISMS reports as well as the Metrics page. Other topics include Cyberday's new framework DORA and recent news around the world.

article

17.5.2024

6 ways to assess security work effectiveness

Evaluating the effectiveness of your cybersecurity involves examining the adequacy of your existing security measures. This process helps you identify your current security status and determine the necessary actions to enhance and fortify.

article

3.5.2024

Best Practices from ISO 27001 for Secure System Acquisition and Development: Create your NIS2 measures

Get tips on securely acquiring and developing systems with a focus on ISO 27001, helping meet NIS2 requirements. Post explains key aspects like secure coding, acquiring secure applications and testing or publishing changes in a controlled manner.

article

16.4.2024

Supply chain attacks caused more data compromises than malware

Steady increase on data breaches on 2nd half of 2022. ⚠️ Attacks on supply chains are becoming a big trend: - Supply chain attacks affected 10+ million people - #Malware-based attacks affected 4.3 million people

Go to article at
27.1.2023

New Python-based RAT Uses WebSockets for C2 and Data Exfiltration

☣️ New #malware dubbed PY#RATION is allowing threat actors to harvest sensitive information. "Malware is unique in its utilization of WebSockets to avoid detection, communicate and exfiltrate data." Attack details in article >>

Go to article at
27.1.2023

Zendesk Hacked After Employees Fall for Phishing Attack

Zendesk informed customers of a breach resulting from employee credentials stolen in "sophisticated sms #phishing campaign". No public notice yet. Attack may be the same that already hit e.g. Twilio and Cloudflare before. #cybersecurity

Go to article at
27.1.2023

New stronger rules start to apply for the cyber and physical resilience of critical entities and networks

NIS 2 Directive will e.g.: 🏛 expand the sectors / types of critical entities on its scope ⚠️ strengthen #cybersecurity risk management requirements 🔈 give more detailed incident reporting obligations (e.g. content and timeline)

Go to article at
20.1.2023

For password protection, dump LastPass for open source Bitwarden

In Dec, LastPass said August #cybersecurity incident had been worse than admitted. Instead of losing internal docs, they lost customer vault data. This article tells about an alternate tool to protect and organize passwords - Bitwarden.

Go to article at
20.1.2023

Ransomware severs 1,000 ships from on-shore servers

Pirating from the comfort of your home? Latest case of transport industry #cyberattack's is ShipManager, a maritime mgmt business, after ransomware forced its software offline and left 1,000 ships w/o connection to on-shore servers.

Go to article at
20.1.2023

Norton LifeLock Discloses Breach Affecting Thousands of Customer Accounts

Norton LifeLock breach may allow hackers access to password vaults. This was a credential stuffing attack — where previously leaked creds used to access accounts with same passwords. MFA and password changes help prevent. #cybersecurity

Go to article at
20.1.2023

A Fifth Of Passwords Used By Federal Agency Cracked In Security Audit

⚠️ Audit on DoI found 21% of employee AD passwords weak enough to be cracked using standard methods in couple of hours (feat. all-time favourites like Password1234 and ChangeItN0w). 362 of affected employees were senior. #cybersecurity

Go to article at
13.1.2023

ChatGPT-Written Malware

🤖 ChatGPT-written #malware is starting to be seen in the wild. Generated code isn’t yet that good. But the trend is worrying, as the tech will get better and can give less skilled hackers - aka script kiddies - new capabilities.

Go to article at
13.1.2023