Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Top 7 information security standards, frameworks and laws explained

Many information security frameworks are available to help organizations build their own security plans. This article provides key information about some of the most popular information security frameworks.

article

4.3.2024

ISO 27001 and NIS2: Understanding their Connection

Learn how the ISO 27001 and the NIS2 are "connected" and why they are brought up together pretty often. Understand their differences and synergy with the help of this blog post.

article

1.3.2024

Guide to Incident Detection and Reporting: Prepared for the Worst

In this guide you'll learn to navigate the incident detection and reporting process, explore various mechanisms, understand reporting, documentation, and derive crucial lessons. We also glance at other ingredients for successful incident management.

article

22.2.2024

NIS2 Overview: History, key contents and significance for top management

Get an overview of NIS2's main contents and understand how it makes top management clearly responsible for organization's information security efforts.

article

16.2.2024

Best Practices and Common Challenges of ISMS Implementation

No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.

article

14.2.2024

ISMS Guide: Top 10 ISMS Implementation Benefits

What is an ISMS and why does your organization benefit from its implementation in the long run? This blog post will give you a short guide about all the basics you need to know about an ISMS and its top 10 benefits.

article

9.2.2024

Intro to Incident Management: Definitions, benefits and best practices

Learn how an incident management process improves communication, documentation, and continuous improvement for IT organisations.

article

6.2.2024

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

Supply chain attacks caused more data compromises than malware

Steady increase on data breaches on 2nd half of 2022. ⚠️ Attacks on supply chains are becoming a big trend: - Supply chain attacks affected 10+ million people - #Malware-based attacks affected 4.3 million people

Go to article at
27.1.2023

New Python-based RAT Uses WebSockets for C2 and Data Exfiltration

☣️ New #malware dubbed PY#RATION is allowing threat actors to harvest sensitive information. "Malware is unique in its utilization of WebSockets to avoid detection, communicate and exfiltrate data." Attack details in article >>

Go to article at
27.1.2023

Zendesk Hacked After Employees Fall for Phishing Attack

Zendesk informed customers of a breach resulting from employee credentials stolen in "sophisticated sms #phishing campaign". No public notice yet. Attack may be the same that already hit e.g. Twilio and Cloudflare before. #cybersecurity

Go to article at
27.1.2023

New stronger rules start to apply for the cyber and physical resilience of critical entities and networks

NIS 2 Directive will e.g.: 🏛 expand the sectors / types of critical entities on its scope ⚠️ strengthen #cybersecurity risk management requirements 🔈 give more detailed incident reporting obligations (e.g. content and timeline)

Go to article at
20.1.2023

For password protection, dump LastPass for open source Bitwarden

In Dec, LastPass said August #cybersecurity incident had been worse than admitted. Instead of losing internal docs, they lost customer vault data. This article tells about an alternate tool to protect and organize passwords - Bitwarden.

Go to article at
20.1.2023

Ransomware severs 1,000 ships from on-shore servers

Pirating from the comfort of your home? Latest case of transport industry #cyberattack's is ShipManager, a maritime mgmt business, after ransomware forced its software offline and left 1,000 ships w/o connection to on-shore servers.

Go to article at
20.1.2023

Norton LifeLock Discloses Breach Affecting Thousands of Customer Accounts

Norton LifeLock breach may allow hackers access to password vaults. This was a credential stuffing attack — where previously leaked creds used to access accounts with same passwords. MFA and password changes help prevent. #cybersecurity

Go to article at
20.1.2023

A Fifth Of Passwords Used By Federal Agency Cracked In Security Audit

⚠️ Audit on DoI found 21% of employee AD passwords weak enough to be cracked using standard methods in couple of hours (feat. all-time favourites like Password1234 and ChangeItN0w). 362 of affected employees were senior. #cybersecurity

Go to article at
13.1.2023

ChatGPT-Written Malware

🤖 ChatGPT-written #malware is starting to be seen in the wild. Generated code isn’t yet that good. But the trend is worrying, as the tech will get better and can give less skilled hackers - aka script kiddies - new capabilities.

Go to article at
13.1.2023