Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Understanding DORA compliance: Key steps to prepare your organization

Understand DORA compliance and get a clear DORA requirements summary with key compliance areas, practical steps, and essential guidelines to strengthen your organization's digital resilience.

article

18.3.2025

ISMS implementation: comparison of documents, wikis, ISMS tools and GRC

There are a few different approaches to building an ISMS. In this post, we’ll compare these different methods, helping you understand which might be the best fit for your organization’s security management needs.

article

6.3.2025

What is Statement of Applicability (SoA) in ISO 27001?

In this blog, we'll cover the main purpose and benefits of a well-working Statement of Applicability document. We'll also explain why SoA is important, and 4 key roles it can play in information security work.

article

4.3.2025

Why is ISO 27001 compliance now more important than ever?

Year after year, ISO 27001 standard has remained one of the gold standards for information security. The global standard has remained relevant, but where did ISO 27001 originate? And why is it's popularity just going up?

article

27.2.2025

10 most common non-conformities in ISO 27001 audits

Audits and non-conformities drive organizations toward continuous improvement. But before your first ISO 27001 certification, it's good to be aware of some most common non-conformities, so you can avoid these in your certification audit.

article

18.2.2025

Got an ISO 27001 audit interview request - what should I expect?

In this blog, we will talk about the importance of employee participation in the audit interview process, why auditors value employee insights, and look into possible questions asked in an ISO 27001 interview.

article

13.2.2025

ISO 27001 compliance and certification checklist

Looking to ensure you fill ISO 27001 requirements? This checklist will present clearly ordered key steps that guide your organization in building an ISMS and getting compliant with the ISO 27001 standard.

article

6.2.2025

Most important documents in ISO 27001 certification audit

The ISO 27001 standard does specifically define some key documents, which need to be gathered together and be easily shareable e.g. for the auditor. In this blog, we'll present these most important documents for an ISO 27001 certification audit.

article

30.1.2025

Class action lawsuit filed against Puerto Rican hospitals that sufffered ransomware attack

A potential class action lawsuit has been filed against two hospitals in Puerto Rico that experienced a ransomware attack in...

Go to article at
15.5.2020
Ransomware

Thousands of hacked Disney+ accounts are already for sale on hacking forums

Hackers began hijacking accounts hours after Disney+ launched earlier this week.

Go to article at
15.5.2020
Password Attacks

COVID-19 Vaccine Test Center Hit By Cyber Attack, Stolen Data Posted Online

A medical facility on standby to help test any coronavirus vaccine has been hit by a ransomware group that promised not to target medical organizations.

Go to article at
15.5.2020
Ransomware

Cybersecurity Tips for Executives

Executives have a target on their backs because their credentials unlock critical chunks of company data – consider these cybersecurity tips. The post Cybersecurity Tips for Executives appeared first on JumpCloud. The post Cybersecurity Tips for Executives appeared first on Security Boulevard.

Go to article at
15.5.2020
Saved For Later,Employee Negligence,Phishing

Sodinokibi, Ryuk ransomware drive up average ransom to $111,000

Ionut Ilascu reports: The first quarter of the year recorded an increase of the average amount ransomware operators demand...

Go to article at
15.5.2020
Ransomware

Maastricht University finally paid a 30 bitcoin ransom to crooks

In December, Maastricht University was hit with ransomware attack, now the university admitted to have paid the ransom requested by crooks. In December 2019, Maastricht University (UM) announced that ransomware infected almost all of its Windows systems on December 23. Maastricht University is an excellent university attended by over 18,000 students, roughly 4,400 employees, and 70,000 alumni. “Maastricht […] The post Maastricht University finally paid a 30 bitcoin ransom to crooks appeared first on Security Affairs.

Go to article at
15.5.2020
Ransomware

Sodinokibi Ransomware Group Sponsors Hacking Contest

Larger winnings for underground skills competitions are attracting sophisticated crime groups.

Go to article at
15.5.2020
Ransomware

Hiding Windows File Extensions is a Security Risk, Enable Now

Microsoft hides file extensions in Windows by default even though it's a security risk that is commonly abused by phishing emails and malware distributors to trick people into opening malicious files. [...]

Go to article at
15.5.2020
CyberNow

Critical Remote Code Execution Bug Fixed in OpenBSD SMTP Server

A critical vulnerability in the free OpenSMTPD email server present in many Unix-based systems can be exploited to run shell commands with root privileges. [...]

Go to article at
15.5.2020
Unpatched Vulnerabilities