Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

What is the NIS2 Law in Belgium? 🇧🇪 Introduction to requirements

Learn what the Belgian NIS2 Law is, Belgium’s national implementation of the EU NIS2 Directive. Understand key requirements, compliance timelines, sector coverage, and how Cyberday helps you meet them.

article

29.4.2025

What is CyberFundamentals? 🇧🇪 Belgium's cybersecurity framework

Learn what is CyberFundamentals, Belgium's cybersecurity framework for SMEs. Get an overview of requirements, benefits, and steps for compliance.

article

29.4.2025

10 things I wish I knew: Starting your ISO 27001 project on the right track

This post shares 10 key lessons learned from going through an ISO 27001 certification project - from the importance of setting clear goals and managing documentation to the realities of risk management and the value of using the right tools.

article

23.4.2025

Understanding NIS2: supervision and penalties of non-compliance

Let's now look into the NIS2 directive, it's supervision in EU member states and what is supervised. We'll also check out NIS2 penalties for noncompliance and how you can stay compliant (to avoid penalties).

article

15.4.2025

Comparing EU cybersecurity frameworks: NIS2, GDPR, DORA and more

A comparison of key cybersecurity frameworks in the EU, including NIS2, GDPR, DORA, CRA, and ISO 27001. Learn who they apply to and what they require.

article

10.4.2025

ISO 27001 compliance vs. certification: differences, benefits & which path to choose

Understanding when to pursue ISO 27001 compliance rather than going for certification—or vice versa—hinges on your organizational priorities, resources, and long-term security strategies. Check the differences and learn which path to choose.

article

1.4.2025

Framework recap, US security & and role management: Cyberday product and news summary 3/2025 🛡️

The March product and news update presents updates to role management and the new Trust Center, a review of the key frameworks for 2025 and US security.

article

28.3.2025

Understanding DORA compliance: Key steps to prepare your organization

Understand DORA compliance and get a clear DORA requirements summary with key compliance areas, practical steps, and essential guidelines to strengthen your organization's digital resilience.

article

18.3.2025

Russia, Ukraine and the Danger of a Global Cyberwar

Russia cyberwar against Ukraine during years. 2015 attack on energy companies caused an outage for 200k people 2016 a transmission station in Kiev lost power 2017 NotPetya wiper #malware delivered ... Now activity is higher than ever.

Go to article at
25.2.2022

How to Prepare as Russia-Ukraine Situation Escalates

Russia-Ukraine tensions are creating #cybersecurity threats elsewhere too. Critical infra and defense are highlighted, but everyone should keep tabs. “Cyberattacks are a logical response from Russia given the economic sanctions announced."

Go to article at
25.2.2022

These new hacking groups are striking industrial, operational tech targets

Cyberattacks against critical infra (energy, food, water, health, etc.) are not about quick money, but about causing real-world disruption. ☣️ 3 new threat groups targeting ICS/OT: Kostovite, Petrovite and Erythrite. #cybersecurity

Go to article at
25.2.2022

Cyber attacks on Ukraine: DDoS, new data wiper, cloned websites, and Cyclops Blink

Russia's horrific invasion accompanied by multiple cyber attacks: ⚠️ DDoS attacks against agency and bank websites ⚠️ New data wiper malware spreading ⚠️ Cloned copies of gov websites booby-trapped w/ #malware

Go to article at
25.2.2022

Top US senator warns Putin cyberattacks could trigger bigger war

Senator overseeing US intelligence agencies said Putin's actions risk triggering NATO's Art. 5's mutual defense pact over cyberattack. This could happen e.g. if cyber weapons deployed in Ukraine spread to NATO states. #cybersecurity

Go to article at
25.2.2022

Hackers slip into Microsoft Teams chats to distribute malware

MS Teams conversations are exploited to distribute malicious files after the 365 credentials have been stolen e.g. through #phishing. Employees may be attentive to email, but vigilance is needed on other channels as well.

Go to article at
18.2.2022

Google announces zero-day in Chrome browser – update now!

Check that you have Chrome 98.0.4758.102 or later. The RCE holes in browsers are dangerous because they can lead to so-called drive-by downloads, where simply visiting a maliciously crafted website can bring #malware to your device.

Go to article at
18.2.2022

NSA Issues Guidance for Selecting Strong Cisco Password Types

NSA issues new guidance on how to use strong password types on Cisco devices. The agency emphasizes that attacks caused by poorly secured network infrastructure are on the rise. #cybersecurity

Go to article at
18.2.2022

Massive cyberattack takes Ukraine military, big bank websites offline

In Ukraine, websites of the Ministry of Defense, other military sites and two major banks crashed in a coordinated DDoS attack. DDoS attacks are often used as a distraction when other intrusion attempts are made or tested. #cybersecurity

Go to article at
18.2.2022