Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Framework recap, US security & and role management: Cyberday product and news summary 3/2025 🛡️

The March product and news update presents updates to role management and the new Trust Center, a review of the key frameworks for 2025 and US security.

article

28.3.2025

Understanding DORA compliance: Key steps to prepare your organization

Understand DORA compliance and get a clear DORA requirements summary with key compliance areas, practical steps, and essential guidelines to strengthen your organization's digital resilience.

article

18.3.2025

ISMS implementation: comparison of documents, wikis, ISMS tools and GRC

There are a few different approaches to building an ISMS. In this post, we’ll compare these different methods, helping you understand which might be the best fit for your organization’s security management needs.

article

6.3.2025

What is Statement of Applicability (SoA) in ISO 27001?

In this blog, we'll cover the main purpose and benefits of a well-working Statement of Applicability document. We'll also explain why SoA is important, and 4 key roles it can play in information security work.

article

4.3.2025

Why is ISO 27001 compliance now more important than ever?

Year after year, ISO 27001 standard has remained one of the gold standards for information security. The global standard has remained relevant, but where did ISO 27001 originate? And why is it's popularity just going up?

article

27.2.2025

10 most common non-conformities in ISO 27001 audits

Audits and non-conformities drive organizations toward continuous improvement. But before your first ISO 27001 certification, it's good to be aware of some most common non-conformities, so you can avoid these in your certification audit.

article

18.2.2025

Got an ISO 27001 audit interview request - what should I expect?

In this blog, we will talk about the importance of employee participation in the audit interview process, why auditors value employee insights, and look into possible questions asked in an ISO 27001 interview.

article

13.2.2025

ISO 27001 compliance and certification checklist

Looking to ensure you fill ISO 27001 requirements? This checklist will present clearly ordered key steps that guide your organization in building an ISMS and getting compliant with the ISO 27001 standard.

article

6.2.2025

Joint Alert Says Russian Hackers Compromised Defense Contractors and Accessed Sensitive Information for Years

FBI, NSA, CISA in a #cybersecurity alert: ⚠️ Regular Russian targeting of defense contractors observed from Jan-20 to Feb-22 Tactics used are familiar: 🎣 spear phishing 🔓 password attacks 🦹 exploiting known vulnerabilities

Go to article at
4.3.2022

Microsoft Accounts Targeted by Russian-Themed Credential Harvesting

While crisis in Ukraine is sparking legitimate #cybersecurity concerns, small-time crooks are seeing an opportunity. ⚠️ Phishing emails to MS users warn of a recent sign-in from Moscow, looking to lift credentials and other personal data.

Go to article at
4.3.2022

Army of Cyber Hackers Rise Up to Back Ukraine

Support for Ukraine is strong on all fronts. 260k people joined the army of volunteer hackers, set up by digital minister. ⚠️ #Cybersecurity researchers are also reminding - these actions have legal risks and a real risk of "hack back".

Go to article at
4.3.2022

Don’t fall for the “Donate to help children in Ukraine” scam

Scammers are active during crises. ⚠️ Latest scam email encourages to donate for refugees. ⚠️ Earlier reports of a Microsoft-themed #phishing ("weird login attempts to your account") Stay vigilant and help through verified channels.

Go to article at
4.3.2022

Cyber attack attempts on Ukraine surge tenfold

Security company Defiant, protecting 8300 Ukrainian WP sites, is seeing a surge since invasion began: 🔺 on 25/2 144k daily attempts to exploit WP vulnerabilities (3x normal daily amount) 📈 on 28/2 10x normal daily amount #cybersecurity

Go to article at
4.3.2022

Russia, Ukraine and the Danger of a Global Cyberwar

Russia cyberwar against Ukraine during years. 2015 attack on energy companies caused an outage for 200k people 2016 a transmission station in Kiev lost power 2017 NotPetya wiper #malware delivered ... Now activity is higher than ever.

Go to article at
25.2.2022

How to Prepare as Russia-Ukraine Situation Escalates

Russia-Ukraine tensions are creating #cybersecurity threats elsewhere too. Critical infra and defense are highlighted, but everyone should keep tabs. “Cyberattacks are a logical response from Russia given the economic sanctions announced."

Go to article at
25.2.2022

These new hacking groups are striking industrial, operational tech targets

Cyberattacks against critical infra (energy, food, water, health, etc.) are not about quick money, but about causing real-world disruption. ☣️ 3 new threat groups targeting ICS/OT: Kostovite, Petrovite and Erythrite. #cybersecurity

Go to article at
25.2.2022

Cyber attacks on Ukraine: DDoS, new data wiper, cloned websites, and Cyclops Blink

Russia's horrific invasion accompanied by multiple cyber attacks: ⚠️ DDoS attacks against agency and bank websites ⚠️ New data wiper malware spreading ⚠️ Cloned copies of gov websites booby-trapped w/ #malware

Go to article at
25.2.2022