Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Information Security Risk Management: A Step-by-step Guide to a Clear Process

This post offers a comprehensive guide on managing information security risks, from pre-steps like asset identification to evaluation, treatment and monitoring. A crucial aspect given the surge of cyber vulnerabilities amid increasing tech advances.

article

21.3.2024

Ransomware, AI Act 101, NIST CSF 2.0: Cyberday product and news round up 3/2024 🛡️

In the March digest, development themes include new frameworks, risk management improvements and a new visual view for documentation cards. The news features Information Security Trailblazers, data breaches and AI Act 101.

article

21.3.2024

Empowering Employees: The Keystone in Incident Detection and Reporting

Employees are vital for detecting and reporting cyber threats and bolstering security. Proper training fosters a resilient culture, ensuring timely responses and safeguarding against breaches.

article

15.3.2024

NIS2 Incident Reporting Requirements and related ISO 27001 Best Practices

This post outlines NIS2 incident reporting and further describes ISO 27001 best practices, and their application in crafting successful incident reporting processes for your organization.

article

8.3.2024

Top 7 information security standards, frameworks and laws explained

Many information security frameworks are available to help organizations build their own security plans. This article provides key information about some of the most popular information security frameworks.

article

4.3.2024

ISO 27001 and NIS2: Understanding their Connection

Learn how the ISO 27001 and the NIS2 are "connected" and why they are brought up together pretty often. Understand their differences and synergy with the help of this blog post.

article

1.3.2024

Guide to Incident Detection and Reporting: Prepared for the Worst

In this guide you'll learn to navigate the incident detection and reporting process, explore various mechanisms, understand reporting, documentation, and derive crucial lessons. We also glance at other ingredients for successful incident management.

article

22.2.2024

NIS2 Overview: History, key contents and significance for top management

Get an overview of NIS2's main contents and understand how it makes top management clearly responsible for organization's information security efforts.

article

16.2.2024

European Police Arrest a Gang That Hacked Wireless Key Fobs to Steal Cars

🗞️ French police (in collab w/ Spain, Latvia) catch a #cybercrime ring of 31 suspects from 22 locations in 3 nations. Members incl. software devs, resellers, and the actual car thieves who used developed tools to break into vehicles.

Go to article at
21.10.2022

Warning: "FaceStealer" iOS and Android apps steal your Facebook login

⚠️ Facestealer #malware spreading through dodgy apps Researchers found 400 iOS/Android apps steal FB creds. They're fun-looking apps (e.g. photo editors, VPNs, games) with good reviews, but demand FB login and send details to fraudsters.

Go to article at
21.10.2022

Qatar Spyware

Visiting Qatar for the World Cup? Get ready to install #spyware. Etheraz, a covid-19 app everyone over 18 must have, needs access to eg: 📍 exact location 🔓 screen lock ❌ read, delete or change all content 💤 prevent sleep mode

Go to article at
21.10.2022

Consumers want more transparency on how companies manage their data

Cisco consumer #privacy survey results: ⚠️ 76% wouldn't buy from a company who they don't want to trust with their data 🏢 37% had indeed switched providers due to poor data privacy practices More findings in the article >>

Go to article at
14.10.2022

Outlining the redress mechanism in the EU-US Data Privacy Framework

On Oct 7 President Biden signed an Executive Order furthering EU-U.S. Data Privacy Framework. This addresses #privacy concerns from CJEU - limiting access to EU data by US intelligence services and creating a Data Protection Review Court.

Go to article at
14.10.2022

AI and Residual Finger Heat Could Be a Password Cracker's Latest Tools

⚠️ Researchers created ThermoSecure, a cheap method bad actors might use to crack passwords. It analyzes heat signatures from thermal cameras with AI to guess a password with 86% accuracy (when image taken in 20 seconds). #cybersecurity

Go to article at
14.10.2022

Consumers want more transparency on how companies manage their data

On Oct 7 President Biden signed an Executive Order furthering EU-U.S. Data Privacy Framework. This addresses #privacy concerns from CJEU - limiting access to EU data by US intelligence services and creating a Data Protection Review Court.

Go to article at
14.10.2022

Google Rolling Out Passkey Passwordless Login Support to Android and Chrome

🔑 Passkeys aim to replace standard passwords with unique digital keys that are stored locally on the device. "They cannot be reused, don't leak in server breaches, and protect users from #phishing attacks."

Go to article at
14.10.2022

Popular YouTube Channel Caught Distributing Malicious Tor Browser Installer

HK based popular YouTube channel used as a means for distributing malicious Tor-version. Browser's own website is blocked in China. ⚠️ #Malware campaigns using hacked channels and video description links are getting more and more popular.

Go to article at
7.10.2022