Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Incident reporting in NIS2: Requirements and related ISO 27001 best practices

This post outlines NIS2 incident reporting and further describes ISO 27001 best practices, and their application in crafting successful incident reporting processes for your organization.

article

8.3.2024

Top 7 information security standards, frameworks and laws explained

Many information security frameworks are available to help organizations build their own security plans. This article provides key information about some of the most popular information security frameworks.

article

4.3.2024

ISO 27001 and NIS2: Understanding their Connection

Learn how the ISO 27001 and the NIS2 are "connected" and why they are brought up together pretty often. Understand their differences and synergy with the help of this blog post.

article

1.3.2024

Guide to Incident Detection and Reporting: Prepared for the Worst

In this guide you'll learn to navigate the incident detection and reporting process, explore various mechanisms, understand reporting, documentation, and derive crucial lessons. We also glance at other ingredients for successful incident management.

article

22.2.2024

NIS2 Overview: History, key contents and significance for top management

Get an overview of NIS2's main contents and understand how it makes top management clearly responsible for organization's information security efforts.

article

16.2.2024

Best Practices and Common Challenges of ISMS Implementation

No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.

article

14.2.2024

ISMS Guide: Top 10 ISMS Implementation Benefits

What is an ISMS and why does your organization benefit from its implementation in the long run? This blog post will give you a short guide about all the basics you need to know about an ISMS and its top 10 benefits.

article

9.2.2024

Intro to Incident Management: Definitions, benefits and best practices

Learn how an incident management process improves communication, documentation, and continuous improvement for IT organisations.

article

6.2.2024

PureLocker: the unusual ransomware that encrypts servers

While we know who the victims of these ransomware attacks are, more often than not, the strain of malware used in the incidents remains unknown. PureLocker is a piece of ransomware that is being used in targeted attacks against company servers, and seems to have links with notorious cybercriminal groups. The source code of PureLocker offers some clues as to its exclusive nature, such as the fact that it contains strings from the ‘more_eggs’ backdoor malware, which is sold by ‘veteran’ malware service providers. The similarities between this malware and PureLocker suggest that it possible that this ransomware starts the same way. This means that, even if a piece of malware contains mechanisms to hinder the creation of detection signatures, as is the case with PureLocker, our advanced cybersecurity solution is capable of detecting and blocking the threat. Don’t become the next victim of PureLocker, and protect yourself with Panda Security.

Go to article at
15.5.2020
Ransomware

Victims lose over $32m to business e-mail impersonation scams in first 9 months of this year: Singapore Police

Police on Tuesday (Nov 26) warned businesses against falling for e-mail impersonation scams, with more than $32 million lost between January and September this year.  In these scams, the victims were tricked into transferring money to business partners or to employees as salaries, only to discover later that the accounts they transferred the money to were controlled by scammers who used hacked or spoofed e-mail accounts to ask for the money. A total of 276 reports were received in the first nine months of this year and a new twist of the scam is also emerging, the police said in a statement. The scammers used to pretend to be chief executive officers, business partners or suppliers, but they are now also passing themselves off as employees of the company.

Go to article at
15.5.2020
Business-Email-Compromise

Swiss info security body warns of ransomware attacks against businesses

FinanceFeeds - Over the recent weeks, MELANI/GovCERT dealt with more than a dozen ransomware cases. The post Swiss info security body warns of ransomware attacks against businesses appeared first on FinanceFeeds.

Go to article at
15.5.2020
Ransomware

97% of IT leaders worried about insider data breaches

A staggering 97% of IT leaders say insider breach risk is a significant concern, according to a survey by Egress. 78% think employees have put data at risk accidentally in the past 12 months and 75% think employees have put data at risk intentionally. When asked about the implications of these breaches, 41% say financial damage would be the area of greatest impact. More than 500 IT leaders and 5000 employees were surveyed across the … More → The post 97% of IT leaders worried about insider data breaches appeared first on Help Net Security.

Go to article at
15.5.2020
Insider Attacks

Microsoft’s case study: Emotet took down an entire network in just 8 days

Microsoft shared details of the Emotet attack suffered by an organization named Fabrikam in the Microsoft’s DART Case Report 002, where Fabrikam is a fake name the IT giant gave the victim.

Go to article at
15.5.2020
Malware

Why the Latest Marriott Breach Should Make Us "Stop and Think" About Security Behaviors

Marriott International has experienced their second data breach

Go to article at
15.5.2020
Illegal Personal Data Processing

Hackers Are Breaking Directly Into Telecom Companies to Take Over Customer Phone Numbers

Hackers are now getting telecom employees to run software that lets the hackers directly reach into the internal systems of U.S. telecom companies to take over customer cell phone numbers, Motherboard has learned. Previously, these hackers have bribed telecom employees to perform SIM swaps or tricked workers to do so by impersonating legitimate customers over the phone or in person. But instead of targeting consumers, they're tricking telecom employees to install or activate RDP software, and then remotely reaching into the company's systems to SIM swap individuals. Once RDP is enabled, "They RDP into the store or call center [computer] [...] and mess around on the employees' computers including using tools," said Nicholas Ceraolo, an independent security researcher who first flagged the issue to Motherboard. Certain employees inside telecom companies have access to tools with the capability to 'port' someone's phone number from one SIM to another.

Go to article at
15.5.2020
Malware

Beware of Amazon Prime Support Scams in Google Search Ads

A malicious ad campaign is underway in Google Search results that lead users to fake Amazon support sites and tech support scams. A security researcher reached out to BleepingComputer today about search keywords such as "amazon prime" and "amazon prime customer support" that leads to ads pretending to be Amazon Prime support. For example, in the image below simply searching for "amazon prime" resulted in a fake and shady-looking support ad hosted on sites.google.com. In addition to Amazon support scams, other ads discovered by the researcher were for the search keywords "my account" and "login" that lead to a variety of different tech support scams like the one below. Tech Support Scam ads in Google Search Clicking on these ads lead to tech support scams located on sites such as  sites.google.com, Azure, and other providers. Tech Support Scam via Google Ads Now many of you may look at these ads and wonder how anyone could fall for them.

Go to article at
15.5.2020
Phishing

Pabbly Email Marketing Exposes 51.2 Million Records Online

Jeremiah Fowler reports: Email marketing is big business and many companies rely on emails to keep in contact with their...

Go to article at
15.5.2020
Illegal Personal Data Processing