Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

This article provides an insight into the main responsibilities of a CISO, from implementing security principles to fostering collaboration. It also presents valuable tips for successful performance, emphasizing constant learning as a key ingredient.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

article

15.12.2023

Working towards NIS2 compliance with Cyberday

✈️ You want to lift your cyber security management to a new level & get NIS2 compliant with a smart tool like Cyberday? In this post you'll learn how your organization can achieve NIS2 compliance in a smart way by building an own agile ISMS.

article

23.8.2023

Who does NIS2 apply to? Scope and required security measures explained.

In this post you'll learn about what industries are affected by NIS2, security requirements the directive sets, and the available enforcement methods if an organization is not compliant.

article

23.8.2023

What is NIS2 directive? Know EU's new cyber security legislation

Learn about the background and reasons behind the EU's new Network and Information Security 2 (NIS2) Directive. How does it affect your company and how should you react to be compliant?

article

1.8.2023

PureLocker: the unusual ransomware that encrypts servers

While we know who the victims of these ransomware attacks are, more often than not, the strain of malware used in the incidents remains unknown. PureLocker is a piece of ransomware that is being used in targeted attacks against company servers, and seems to have links with notorious cybercriminal groups. The source code of PureLocker offers some clues as to its exclusive nature, such as the fact that it contains strings from the ‘more_eggs’ backdoor malware, which is sold by ‘veteran’ malware service providers. The similarities between this malware and PureLocker suggest that it possible that this ransomware starts the same way. This means that, even if a piece of malware contains mechanisms to hinder the creation of detection signatures, as is the case with PureLocker, our advanced cybersecurity solution is capable of detecting and blocking the threat. Don’t become the next victim of PureLocker, and protect yourself with Panda Security.

Go to article at
15.5.2020
Ransomware

Victims lose over $32m to business e-mail impersonation scams in first 9 months of this year: Singapore Police

Police on Tuesday (Nov 26) warned businesses against falling for e-mail impersonation scams, with more than $32 million lost between January and September this year.  In these scams, the victims were tricked into transferring money to business partners or to employees as salaries, only to discover later that the accounts they transferred the money to were controlled by scammers who used hacked or spoofed e-mail accounts to ask for the money. A total of 276 reports were received in the first nine months of this year and a new twist of the scam is also emerging, the police said in a statement. The scammers used to pretend to be chief executive officers, business partners or suppliers, but they are now also passing themselves off as employees of the company.

Go to article at
15.5.2020
Business-Email-Compromise

Swiss info security body warns of ransomware attacks against businesses

FinanceFeeds - Over the recent weeks, MELANI/GovCERT dealt with more than a dozen ransomware cases. The post Swiss info security body warns of ransomware attacks against businesses appeared first on FinanceFeeds.

Go to article at
15.5.2020
Ransomware

97% of IT leaders worried about insider data breaches

A staggering 97% of IT leaders say insider breach risk is a significant concern, according to a survey by Egress. 78% think employees have put data at risk accidentally in the past 12 months and 75% think employees have put data at risk intentionally. When asked about the implications of these breaches, 41% say financial damage would be the area of greatest impact. More than 500 IT leaders and 5000 employees were surveyed across the … More → The post 97% of IT leaders worried about insider data breaches appeared first on Help Net Security.

Go to article at
15.5.2020
Insider Attacks

Microsoft’s case study: Emotet took down an entire network in just 8 days

Microsoft shared details of the Emotet attack suffered by an organization named Fabrikam in the Microsoft’s DART Case Report 002, where Fabrikam is a fake name the IT giant gave the victim.

Go to article at
15.5.2020
Malware

Why the Latest Marriott Breach Should Make Us "Stop and Think" About Security Behaviors

Marriott International has experienced their second data breach

Go to article at
15.5.2020
Illegal Personal Data Processing

Hackers Are Breaking Directly Into Telecom Companies to Take Over Customer Phone Numbers

Hackers are now getting telecom employees to run software that lets the hackers directly reach into the internal systems of U.S. telecom companies to take over customer cell phone numbers, Motherboard has learned. Previously, these hackers have bribed telecom employees to perform SIM swaps or tricked workers to do so by impersonating legitimate customers over the phone or in person. But instead of targeting consumers, they're tricking telecom employees to install or activate RDP software, and then remotely reaching into the company's systems to SIM swap individuals. Once RDP is enabled, "They RDP into the store or call center [computer] [...] and mess around on the employees' computers including using tools," said Nicholas Ceraolo, an independent security researcher who first flagged the issue to Motherboard. Certain employees inside telecom companies have access to tools with the capability to 'port' someone's phone number from one SIM to another.

Go to article at
15.5.2020
Malware

Beware of Amazon Prime Support Scams in Google Search Ads

A malicious ad campaign is underway in Google Search results that lead users to fake Amazon support sites and tech support scams. A security researcher reached out to BleepingComputer today about search keywords such as "amazon prime" and "amazon prime customer support" that leads to ads pretending to be Amazon Prime support. For example, in the image below simply searching for "amazon prime" resulted in a fake and shady-looking support ad hosted on sites.google.com. In addition to Amazon support scams, other ads discovered by the researcher were for the search keywords "my account" and "login" that lead to a variety of different tech support scams like the one below. Tech Support Scam ads in Google Search Clicking on these ads lead to tech support scams located on sites such as  sites.google.com, Azure, and other providers. Tech Support Scam via Google Ads Now many of you may look at these ads and wonder how anyone could fall for them.

Go to article at
15.5.2020
Phishing

Pabbly Email Marketing Exposes 51.2 Million Records Online

Jeremiah Fowler reports: Email marketing is big business and many companies rely on emails to keep in contact with their...

Go to article at
15.5.2020
Illegal Personal Data Processing