Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Ransomware, AI Act 101, NIST CSF 2.0: Cyberday product and news round up 3/2024 🛡️

In the March digest, development themes include new frameworks, risk management improvements and a new visual view for documentation cards. The news features Information Security Trailblazers, data breaches and AI Act 101.

article

21.3.2024

Empowering Employees: The Keystone in Incident Detection and Reporting

Employees are vital for detecting and reporting cyber threats and bolstering security. Proper training fosters a resilient culture, ensuring timely responses and safeguarding against breaches.

article

15.3.2024

Incident reporting in NIS2: Requirements and related ISO 27001 best practices

Understand NIS2 incident reporting requirements and how ISO 27001 best practices can help ensure compliance and enhance your organization's security posture.

article

8.3.2024

Top 7 information security standards, frameworks and laws explained

Many information security frameworks are available to help organizations build their own security plans. This article provides key information about some of the most popular information security frameworks.

article

4.3.2024

ISO 27001 and NIS2: Understanding their Connection

Learn how ISO 27001 and NIS2 relate, how they differ, and why organizations often address them together for stronger cybersecurity and compliance.

article

1.3.2024

Guide to Incident Detection and Reporting: Prepared for the Worst

In this guide you'll learn to navigate the incident detection and reporting process, explore various mechanisms, understand reporting, documentation, and derive crucial lessons. We also glance at other ingredients for successful incident management.

article

22.2.2024

NIS2 Overview: History, key contents and significance for top management

Get an overview of NIS2's main contents and understand how it makes top management clearly responsible for organization's information security efforts.

article

16.2.2024

Best Practices and Common Challenges of ISMS Implementation

No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.

article

14.2.2024

Riot Games refuses to pay ransom to avoid League of Legends leak

⚠️ Riot Games was breached by a social engineering #cyberattack and now demanded 10M$ to stop leaking source code. They didn't pay and are now working to restore operations. This continues recent game company breaches (e.g. 2K, Rockstar).

Go to article at
3.2.2023

Researchers Uncover Packer Used by Several Malware to Evade Detection for 6 Years

☢️ A shellcode-based packer dubbed TrickGate has been successfully operating for over six years evading detection, while enabling threat actors to deliver a wide range of malware such as TrickBot and Emotet. #cybersecurity

Go to article at
3.2.2023

JD Sports Says 10 Million Customers Hit By Cyber Attack

JD Sports had a breach relating to online orders Nov/18-Oct/20. ⚠️ Affected customers advised to stay vigilant towards scam e-mails, calls and texts. Retailers are common targets for #cyberattack's due to vast customer data they hold.

Go to article at
3.2.2023

Near-Record Year for US Data Breaches in 2022

Takeways on ITRC's US data breaches in 2022 report: ⚠️ Only 34% of breach notices incl victim and attack details. Hard for people to estimate their risk. Other info: 👥 422 million affected 🎣 Phishing and #ransomware popular vectors

Go to article at
27.1.2023

Hunting Insider Threats on the Dark Web

💣 Malicious employees cause 20% of incidents. Insider attacks are on avg. 10x larger. Companies can spot threats by spotting crooks after insider knowledge or disgruntled employees' unsavory comments - also on dark web. #cybersecurity

Go to article at
27.1.2023

Supply chain attacks caused more data compromises than malware

Steady increase on data breaches on 2nd half of 2022. ⚠️ Attacks on supply chains are becoming a big trend: - Supply chain attacks affected 10+ million people - #Malware-based attacks affected 4.3 million people

Go to article at
27.1.2023

New Python-based RAT Uses WebSockets for C2 and Data Exfiltration

☣️ New #malware dubbed PY#RATION is allowing threat actors to harvest sensitive information. "Malware is unique in its utilization of WebSockets to avoid detection, communicate and exfiltrate data." Attack details in article >>

Go to article at
27.1.2023

Zendesk Hacked After Employees Fall for Phishing Attack

Zendesk informed customers of a breach resulting from employee credentials stolen in "sophisticated sms #phishing campaign". No public notice yet. Attack may be the same that already hit e.g. Twilio and Cloudflare before. #cybersecurity

Go to article at
27.1.2023

New stronger rules start to apply for the cyber and physical resilience of critical entities and networks

NIS 2 Directive will e.g.: 🏛 expand the sectors / types of critical entities on its scope ⚠️ strengthen #cybersecurity risk management requirements 🔈 give more detailed incident reporting obligations (e.g. content and timeline)

Go to article at
20.1.2023