Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Potential Struggles IT Companies might Encounter with Incident Identification and Reporting Today

The complexities of incident identification and reporting in IT, touching on coordination problems, tool inadequacies, and process deficiencies. It explores modern challenges like cyber threats and alert fatigue, as well as the cognitive gap.

article

28.3.2024

Information Security Risk Management: A Step-by-Step Process

Manage information security risks with a clear step-by-step process, from asset identification to monitoring, essential for navigating growing cybersecurity threats.

article

21.3.2024

Ransomware, AI Act 101, NIST CSF 2.0: Cyberday product and news round up 3/2024 🛡️

In the March digest, development themes include new frameworks, risk management improvements and a new visual view for documentation cards. The news features Information Security Trailblazers, data breaches and AI Act 101.

article

21.3.2024

Empowering Employees: The Keystone in Incident Detection and Reporting

Employees are vital for detecting and reporting cyber threats and bolstering security. Proper training fosters a resilient culture, ensuring timely responses and safeguarding against breaches.

article

15.3.2024

Incident reporting in NIS2: Requirements and related ISO 27001 best practices

Understand NIS2 incident reporting requirements and how ISO 27001 best practices can help ensure compliance and enhance your organization's security posture.

article

8.3.2024

Top information security standards, frameworks and laws explained

Many information security frameworks are available to help organizations build their own security plans. This article provides key information about some of the most popular information security frameworks.

article

4.3.2024

ISO 27001 and NIS2: Understanding their Connection

Learn how ISO 27001 and NIS2 relate, how they differ, and why organizations often address them together for stronger cybersecurity and compliance.

article

1.3.2024

Guide to Incident Detection and Reporting: Prepared for the Worst

In this guide you'll learn to navigate the incident detection and reporting process, explore various mechanisms, understand reporting, documentation, and derive crucial lessons. We also glance at other ingredients for successful incident management.

article

22.2.2024

Consumer Confidence in Data Security Plummets

Default customer trust in good #cybersecurity is being replaced by suspicion (2000 US adults surveyed): ⚡ 78% believe it’s easy for cybercriminals to breach an organization ⚡ 73% believe most organizations lack good controls over access

Go to article at
24.8.2021

Tietosuojavaltuutetun toimisto tehostaa ETA-maiden ulkopuolelle tehtävien henkilötietojen siirtojen valvontaa

As guidance is fined down, Finnish DPA is increasing control of data transfers. ⚠️ Before transferring data outside the EEA, you must be aware of the basis for the transfer and ensure an adequate level of #dataprotection is quaranteed.

Go to article at
24.8.2021

How attackers could exploit breached T-Mobile user data

T-Mobile suffered a data breach that affected about 50 million people. Danger to victims includes: ⚠️ SMS phishing (impersonating the operator) and malware ⚠️ SIM swapping attacks Read the article for protection tips #cybersecurity

Go to article at
24.8.2021

Education giant Pearson fined $1M for downplaying data breach

2018 data breach led to the compromise of 13 000 student / admin login credentials. The breach was disclosed only after media inquiries and its effects were downplated. This resulted in now decided $1M additional fine. #cybersecurity

Go to article at
19.8.2021

XSS Bug in SEOPress WordPress Plugin Allows Full Site Takeover

Cross-site scripting (XSS) vulnerability in a popular WordPress plugin allows attackers to inject arbitrary web scripts into sites, as one API endpoint was insecurely implemented. Plugin is installed on 100,000 websites. #cybersecurity

Go to article at
19.8.2021

Phishing Costs Nearly Quadrupled Over 6 Years

“Until organizations deploy a people-centric approach to cybersecurity that includes security awareness training and integrated threat protection to stop and remediate threats, phishing attacks will continue.” #cybersecurity

Go to article at
17.8.2021

65 vendors affected by severe vulnerabilities in Realtek chips

Researchers found a vulnerability on Realtek chips, informed them and Realtek promptly provided an appropriate patch. To prevent risky devices, manufacturers need to check their hardware and provide patches to their users. #cybersecurity

Go to article at
17.8.2021

Most organizations experienced at least one ransomware attack, multiple attacks very common

Worrying #ransomware statistics: ⚠️ 37% of organisations experienced a successful attack in previous 12 months ⚠️ only 13% of attacked organisations reported NOT paying the ransom 📈 avg. ransom 250k$ #cybersecurity

Go to article at
17.8.2021

How hackers can use message mirroring apps to see all your SMS texts — and bypass 2FA security

Major vendors (e.g. Microsoft) have urged users to abandon 2FA solutions that leverage one-time codes sent via SMS. 2FA w/ SMS is open to multiple attacks, like SIM swapping, request smuggling and notification mirroring. #cybersecurity

Go to article at
17.8.2021