Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Top 7 information security standards, frameworks and laws explained

Many information security frameworks are available to help organizations build their own security plans. This article provides key information about some of the most popular information security frameworks.

article

4.3.2024

ISO 27001 and NIS2: Understanding their Connection

Learn how the ISO 27001 and the NIS2 are "connected" and why they are brought up together pretty often. Understand their differences and synergy with the help of this blog post.

article

1.3.2024

Guide to Incident Detection and Reporting: Prepared for the Worst

In this guide you'll learn to navigate the incident detection and reporting process, explore various mechanisms, understand reporting, documentation, and derive crucial lessons. We also glance at other ingredients for successful incident management.

article

22.2.2024

NIS2 Overview: History, key contents and significance for top management

Get an overview of NIS2's main contents and understand how it makes top management clearly responsible for organization's information security efforts.

article

16.2.2024

Best Practices and Common Challenges of ISMS Implementation

No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.

article

14.2.2024

ISMS Guide: Top 10 ISMS Implementation Benefits

What is an ISMS and why does your organization benefit from its implementation in the long run? This blog post will give you a short guide about all the basics you need to know about an ISMS and its top 10 benefits.

article

9.2.2024

Intro to Incident Management: Definitions, benefits and best practices

Learn how an incident management process improves communication, documentation, and continuous improvement for IT organisations.

article

6.2.2024

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

Facebook phishers threaten users with Page Recovery Help Support

Bogus recovery service activity on FB, trying to scare users into #phishing traps to takeover accounts and steal more FB pages for this use. ➡️ Stay aware and use MFA and good password practices to protect your account. Learn more >>

Go to article at
29.4.2022

Microsoft Discloses Onslaught of Russian Cyberattacks on Ukraine

Between 23/2-08/4, MS observed 37 destructive RUS #cyberattack's in Ukraine. ⚠️ This suggests cyber playing a bigger role in the war than previously known. Example timelines of linked cyber&military operations in the article >>

Go to article at
29.4.2022

Ransomware Attacks Affected 649 Critical Infrastructure Organizations in 2021, FBI Cyber Crime Report Says

🗞️ FBI's IC3 released 2021 its cyber crime report. 👤 847,376 complaints 💸 $6.9 billion in total losses #Ransomware attacks pose the biggest risk to critical infrastructure, with 649 organizations affected in 14/16 sectors in 2021.

Go to article at
8.4.2022

The Original APT: Advanced Persistent Teenagers

⚠️ LAPSUS$ has breached top companies. MS warns they use old-fashioned techniques, that are hard to block with tech: 👤 target staff at personal addresses 💰 offer $20,000 a week to buy remote access creds 🎣 #phishing to help desk

Go to article at
8.4.2022

Android apps with 45 million installs used data harvesting SDK

Warning about Play apps stealing data with an SDK by a shady Panama-based firm. ⚠️ Apps were collecting data with significant #privacy risks, e.g. any clipboard content, GPS data, emails and phone numbers. List of apps in the article >

Go to article at
8.4.2022

Germany Shuts Down Russian Hydra Darknet Market; Seizes $25 Million in Bitcoin

🚨 Takedown of Hydra, a Russian-language darkweb market of 17M users and active since 2015, was announced on Tuesday. It was used to sell e.g.: 💊 illegal narcotics 🆔 forged documents / IDs 💳 stolen credit / sim cards #cybersecurity

Go to article at
8.4.2022

Lapsus$ And SolarWinds Hackers Both Use The Same Old Trick To Bypass MFA

MFA is one of most important safeguards in #cybersecurity. ⚠️ But hackers have ways to clear weaker forms of MFA. A technique called MFA prompt-bombing has been used in multiple high-profile company hacks lately. Learn more here >>

Go to article at
8.4.2022

A Detailed Look at the Conti Ransomware Gang

Ukrainian researcher leaked 60,000 messages from inside Conti - a #ransomware gang that extorted 180M$ just last year. ☢️ Msgs reveal e.g. a business-like hierarchy, ways to dodge law enforcement and negotiation tactics. Learn more >>

Go to article at
1.4.2022

Hackers Use Google reCAPTCHA To Hide Phishing URLs and Defeat Email Security Scanners To Steal User Credentials

Websites use Google's reCAPTCHA to ensure they interact with humans, not bots. 🎣 Criminals use it to hide #phishing URLs. You get an email with an attachment taking you to reCAPTCHA. Only after the puzzle, you get to e.g. fake MS login.

Go to article at
1.4.2022