Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

NIS2 Overview: History, key contents and significance for top management

Get an overview of NIS2's main contents and understand how it makes top management clearly responsible for organization's information security efforts.

article

16.2.2024

Best Practices and Common Challenges of ISMS Implementation

No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.

article

14.2.2024

ISMS Guide: Top 10 ISMS Implementation Benefits

What is an ISMS and why does your organization benefit from its implementation in the long run? This blog post will give you a short guide about all the basics you need to know about an ISMS and its top 10 benefits.

article

9.2.2024

Intro to Incident Management: Definitions, benefits and best practices

Strong incident management process minimizes disruptions. Learn how to build a process that keeps your org running during critical events.

article

6.2.2024

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

Explore the top 10 responsibilities of a CISO and get best practices for success, covering risk management, collaboration, compliance, and continuous learning.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

Coca-Cola Investigates Data-Theft Claims After Ransomware Attack

#Ransomware group Stormous claims to have stolen 161GB of Coca-Cola's data - and is willing to sell it for 64k€. Case is unconfirmed & the relatively small ask is making experts suspicious of the value and even existence of stolen data.

Go to article at
29.4.2022

Facebook phishers threaten users with Page Recovery Help Support

Bogus recovery service activity on FB, trying to scare users into #phishing traps to takeover accounts and steal more FB pages for this use. ➡️ Stay aware and use MFA and good password practices to protect your account. Learn more >>

Go to article at
29.4.2022

Microsoft Discloses Onslaught of Russian Cyberattacks on Ukraine

Between 23/2-08/4, MS observed 37 destructive RUS #cyberattack's in Ukraine. ⚠️ This suggests cyber playing a bigger role in the war than previously known. Example timelines of linked cyber&military operations in the article >>

Go to article at
29.4.2022

Ransomware Attacks Affected 649 Critical Infrastructure Organizations in 2021, FBI Cyber Crime Report Says

🗞️ FBI's IC3 released 2021 its cyber crime report. 👤 847,376 complaints 💸 $6.9 billion in total losses #Ransomware attacks pose the biggest risk to critical infrastructure, with 649 organizations affected in 14/16 sectors in 2021.

Go to article at
8.4.2022

The Original APT: Advanced Persistent Teenagers

⚠️ LAPSUS$ has breached top companies. MS warns they use old-fashioned techniques, that are hard to block with tech: 👤 target staff at personal addresses 💰 offer $20,000 a week to buy remote access creds 🎣 #phishing to help desk

Go to article at
8.4.2022

Android apps with 45 million installs used data harvesting SDK

Warning about Play apps stealing data with an SDK by a shady Panama-based firm. ⚠️ Apps were collecting data with significant #privacy risks, e.g. any clipboard content, GPS data, emails and phone numbers. List of apps in the article >

Go to article at
8.4.2022

Germany Shuts Down Russian Hydra Darknet Market; Seizes $25 Million in Bitcoin

🚨 Takedown of Hydra, a Russian-language darkweb market of 17M users and active since 2015, was announced on Tuesday. It was used to sell e.g.: 💊 illegal narcotics 🆔 forged documents / IDs 💳 stolen credit / sim cards #cybersecurity

Go to article at
8.4.2022

Lapsus$ And SolarWinds Hackers Both Use The Same Old Trick To Bypass MFA

MFA is one of most important safeguards in #cybersecurity. ⚠️ But hackers have ways to clear weaker forms of MFA. A technique called MFA prompt-bombing has been used in multiple high-profile company hacks lately. Learn more here >>

Go to article at
8.4.2022

A Detailed Look at the Conti Ransomware Gang

Ukrainian researcher leaked 60,000 messages from inside Conti - a #ransomware gang that extorted 180M$ just last year. ☢️ Msgs reveal e.g. a business-like hierarchy, ways to dodge law enforcement and negotiation tactics. Learn more >>

Go to article at
1.4.2022