Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Framework recap, US security & and role management: Cyberday product and news summary 3/2025 🛡️

The March product and news update presents updates to role management and the new Trust Center, a review of the key frameworks for 2025 and US security.

article

28.3.2025

Understanding DORA compliance: Key steps to prepare your organization

Understand DORA compliance and get a clear DORA requirements summary with key compliance areas, practical steps, and essential guidelines to strengthen your organization's digital resilience.

article

18.3.2025

ISMS implementation: comparison of documents, wikis, ISMS tools and GRC

There are a few different approaches to building an ISMS. In this post, we’ll compare these different methods, helping you understand which might be the best fit for your organization’s security management needs.

article

6.3.2025

What is Statement of Applicability (SoA) in ISO 27001?

In this blog, we'll cover the main purpose and benefits of a well-working Statement of Applicability document. We'll also explain why SoA is important, and 4 key roles it can play in information security work.

article

4.3.2025

Why is ISO 27001 compliance now more important than ever?

Year after year, ISO 27001 standard has remained one of the gold standards for information security. The global standard has remained relevant, but where did ISO 27001 originate? And why is it's popularity just going up?

article

27.2.2025

10 most common non-conformities in ISO 27001 audits

Audits and non-conformities drive organizations toward continuous improvement. But before your first ISO 27001 certification, it's good to be aware of some most common non-conformities, so you can avoid these in your certification audit.

article

18.2.2025

Got an ISO 27001 audit interview request - what should I expect?

In this blog, we will talk about the importance of employee participation in the audit interview process, why auditors value employee insights, and look into possible questions asked in an ISO 27001 interview.

article

13.2.2025

ISO 27001 compliance and certification checklist

Looking to ensure you fill ISO 27001 requirements? This checklist will present clearly ordered key steps that guide your organization in building an ISMS and getting compliant with the ISO 27001 standard.

article

6.2.2025

GoDaddy admits to password breach: check your Managed WordPress site!

GoDaddy #cybersecurity breach: ⚠️ 1,2M managed WP sites affected ⚠️ Crooks in its network for 6 weeks ⚠️ sFTP and database passwords leaked (no encryption reported!) ⚠️ SSL/TLS private keys leaked What-to-do's on the article >>

Go to article at
23.11.2021

Emotet malware is back and rebuilding its botnet via TrickBot

In early 2021 Europol and Eurojust took over the Emotet infrastructure and arrested two individuals. ⚠️ Now researchers see signs of Emotet activity increasing. Takedown hasn't prevented the adversaries from bringing the #malware back.

Go to article at
19.11.2021

FBI's Email System Hacked to Send Out Fake Cyber Security Alert to Thousands

⚠️ FBI server was hijacked and 100,000 people were alerted of a fake cyber attack. An embarrassing case that could have been a lot worse if, instead of "trolling", the threat actor would have been #phishing or distributing malware.

Go to article at
19.11.2021

SharkBot — A New Android Trojan Stealing Banking and Cryptocurrency Accounts

🕵️ Researchers on Monday reported a new Android trojan called SharkBot. #Malware masquarades as media player and uses accessibility features (intended to assist people with disabilities) to e.g. steal banking and crypto app credentials.

Go to article at
19.11.2021

'PerSwaysion' Phishing Campaign Still Ongoing, and Pervasive

The PerSwaysion #phishing kit has been used in thousands of attacks around the world - and is still active. The scams utilize Microsoft's file-sharing services (e.g. SharePoint) to trick people into credential-stealing sites.

Go to article at
19.11.2021

This Mysterious Malware Could Threaten Millions Of Routers And IoT Devices

Researchers have identified a new BotenaGo #malware that targets e.g. routers and IoT devices, exploiting over 30 different vulnerabilities. Good protection practices include prompt security updates and a well-maintained firewall.

Go to article at
18.11.2021

Fishing Gear Seller Caught In Hacker's Net

⚠️ UK's biggest fishing shop suffefing a cyber attack. Experts tell signs point to employee login credentials having been stolen, allowing the hackers to take over company website and Twitter account. #cybersecurity

Go to article at
11.11.2021

Phishing attacks grow 31.5% over 2020, social media attacks continue to climb

Other important numbers from PhishLabs report: 📈 51.6% of credential stealing #phishing targeted O365 logins 📈 82% increase in social media attacks during 2021 📈 Amount of vishing attacks more than doubled during Q2 and Q3/2021

Go to article at
11.11.2021

Robinhood discloses data breach impacting 7 million customers

🚨 A threat actor called stock trading platform's customer support and was able to obtain access to customer support systems through social engineering. This resulted in a data breach impacting 7 million customers. #cybersecurity

Go to article at
10.11.2021