Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Potential Struggles IT Companies might Encounter with Incident Identification and Reporting Today

The complexities of incident identification and reporting in IT, touching on coordination problems, tool inadequacies, and process deficiencies. It explores modern challenges like cyber threats and alert fatigue, as well as the cognitive gap.

article

28.3.2024

Information Security Risk Management: A Step-by-Step Process

Manage information security risks with a clear step-by-step process, from asset identification to monitoring, essential for navigating growing cybersecurity threats.

article

21.3.2024

Ransomware, AI Act 101, NIST CSF 2.0: Cyberday product and news round up 3/2024 🛡️

In the March digest, development themes include new frameworks, risk management improvements and a new visual view for documentation cards. The news features Information Security Trailblazers, data breaches and AI Act 101.

article

21.3.2024

Empowering Employees: The Keystone in Incident Detection and Reporting

Employees are vital for detecting and reporting cyber threats and bolstering security. Proper training fosters a resilient culture, ensuring timely responses and safeguarding against breaches.

article

15.3.2024

Incident reporting in NIS2: Requirements and related ISO 27001 best practices

Understand NIS2 incident reporting requirements and how ISO 27001 best practices can help ensure compliance and enhance your organization's security posture.

article

8.3.2024

Top information security standards, frameworks and laws explained

Many information security frameworks are available to help organizations build their own security plans. This article provides key information about some of the most popular information security frameworks.

article

4.3.2024

ISO 27001 and NIS2: Understanding their Connection

Learn how ISO 27001 and NIS2 relate, how they differ, and why organizations often address them together for stronger cybersecurity and compliance.

article

1.3.2024

Guide to Incident Detection and Reporting: Prepared for the Worst

In this guide you'll learn to navigate the incident detection and reporting process, explore various mechanisms, understand reporting, documentation, and derive crucial lessons. We also glance at other ingredients for successful incident management.

article

22.2.2024

Hacktivists Say They Hacked Belarus Rail System To Stop Russian Military Buildup

❔ Belarus state-run railroad system was on monday infected with #ransomware. These hacktivists say, they will provide decryption key only if President Lukashenko stops aiding Russian troops ahead of a possible invasion of Ukraine.

Go to article at
28.1.2022

Mac webcam hijack flaw wins man $100,500 from Apple

🧑‍💻 Security researcher got a $100,500 bug bounty from Apple after discovering a vulnerability in Safari browser for macOS that could allow a malicious website to hijack accounts and seize control of users' webcams. #cybersecurity

Go to article at
28.1.2022

How tech is a weapon in modern domestic abuse -- and how to protect yourself

Through technology, it is possible to stalk someone with very little effort. Motivations are manifold. This article tells more about spyware and stalkerware and how you can combat technological stalking. #cybersecurity

Go to article at
21.1.2022

483 Crypto.com accounts compromised in $34 million hack

Crypto.com confirmed a breach resulting in unauthorized withdrawals worth 34 M$. Some were allegedly prevented, in rest customers fully reimbursed. In 2021 platform also suffered a glitch that led to duplicate purchases. #cybersecurity

Go to article at
21.1.2022

CISA urges US orgs to prepare for data-wiping cyberattacks

Cyber criminals are exploiting CVE-2021-32648 for data-wiping attacks against Ukrainian gov and businesses. #Cybersecurity agencies around the world are urging businesses to take preparatory actions, like MFA, patching and vuln scanning.

Go to article at
21.1.2022

Panic As Kosovo Pulls The Plug On Its Energy Guzzling Bitcoin Miners

🛑 To ease energy crisis, Kosovo's government in Dec announced an immediate, albeit temporary, ban on all crypto mining activity. This created panic, as people are selling off their mining equipment – at knockdown prices. #cybersecurity

Go to article at
21.1.2022

FIN8 Hackers Spotted Using New 'White Rabbit' Ransomware in Recent Attacks

⚠️ FIN8 is back with a never-before-seen #ransomware, recently used eg against US banks. This malware uses double-extortion and hides its maliciousness by requiring a specific command-line password to decrypt its internal configuration.

Go to article at
21.1.2022

Fingers point to Lazarus, Cobalt, FIN7 as key hacking groups attacking finance industry

💰 Finance industry, a top target for #cybercrime due to eg lots of sensitive PII and data systems critical for economy. Lazarus, Cobalt, and FIN7 top threat actors. Top attacks phishing, BEC, malware (also PoS), card skimmers and DDoS.

Go to article at
14.1.2022

FBI: Hackers target US defense firms with malicious USB packages

⚠️ FIN7 cybercrime group targets US defense industry by posting them malicious USB devices. Hackers impersonate authorities to trick connecting the drive. Once plugged in, device injects keystrokes to install malware. #cybersecurity

Go to article at
14.1.2022