Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Information Security Risk Management: A Step-by-step Guide to a Clear Process

This post offers a comprehensive guide on managing information security risks, from pre-steps like asset identification to evaluation, treatment and monitoring. A crucial aspect given the surge of cyber vulnerabilities amid increasing tech advances.

article

21.3.2024

Ransomware, AI Act 101, NIST CSF 2.0: Cyberday product and news round up 3/2024 🛡️

In the March digest, development themes include new frameworks, risk management improvements and a new visual view for documentation cards. The news features Information Security Trailblazers, data breaches and AI Act 101.

article

21.3.2024

Empowering Employees: The Keystone in Incident Detection and Reporting

Employees are vital for detecting and reporting cyber threats and bolstering security. Proper training fosters a resilient culture, ensuring timely responses and safeguarding against breaches.

article

15.3.2024

NIS2 Incident Reporting Requirements and related ISO 27001 Best Practices

This post outlines NIS2 incident reporting and further describes ISO 27001 best practices, and their application in crafting successful incident reporting processes for your organization.

article

8.3.2024

Top 7 information security standards, frameworks and laws explained

Many information security frameworks are available to help organizations build their own security plans. This article provides key information about some of the most popular information security frameworks.

article

4.3.2024

ISO 27001 and NIS2: Understanding their Connection

Learn how the ISO 27001 and the NIS2 are "connected" and why they are brought up together pretty often. Understand their differences and synergy with the help of this blog post.

article

1.3.2024

Guide to Incident Detection and Reporting: Prepared for the Worst

In this guide you'll learn to navigate the incident detection and reporting process, explore various mechanisms, understand reporting, documentation, and derive crucial lessons. We also glance at other ingredients for successful incident management.

article

22.2.2024

NIS2 Overview: History, key contents and significance for top management

Get an overview of NIS2's main contents and understand how it makes top management clearly responsible for organization's information security efforts.

article

16.2.2024

New Hertzbleed Side Channel Attack Affects All Modern AMD and Intel CPUs

⚠️ New interesting #vulnerability in modern Intel/AMD processors can let attackers steal e.g. encryption keys via timing-based side channels. Intel recommends cryptographic devs to harden apps against frequency throttling info disclosure.

Go to article at
17.6.2022

Facebook Messenger Scam Duped Millions

🎣 One #phishing scam stole 1M FB credentials in 4 months - and counting. Scam included familiar elements: 🔗 short msg with a link ↩️ chain of redirects to dodge security 🔐 fake FB login 🤖 automated distribution to victim's friends

Go to article at
17.6.2022

Ransomware Group Debuts Searchable Victim Data

#Ransomware groups have started regularly threatening to publish stolen victim data on dark web. ⚠️ Latest cunning innovation to get victims concerned is publishing on public internet, with all data available in an easily searchable form.

Go to article at
17.6.2022

Paying Ransomware Paints Bigger Bullseye on Target’s Back

#Ransomware deals often go wrong: ⚠️ 80% of victims that paid were hit a 2nd time ⚠️ Frequently data became unusable during the decryption because of corruption issues Remember - attackers will often try to profit in any possible way.

Go to article at
10.6.2022

Cybersecurity awareness training: What is it and what works best?

82% of breaches in 2021 involved a “human element.” Bad actors exploit credulous or careless employees. Trends that grow the need for employee #cybersecurity skills: 🔓 Poor password practices 🦹 Cybercrime growth 📲 Hybrid work

Go to article at
10.6.2022

Know your enemy! Learn how cybercrime adversaries get in…

Researchers dug into reports of 144 real-life #cyberattack's. ⚠️ Unpatched vulnerabilties entry point for 50% of attacks ⌛ Attackers around for more than a month on avg 🖥️ RDP abused to spread the attack by more than 80% of attackers

Go to article at
10.6.2022

Apple's New Feature Will Install Security Updates Automatically Without Full OS Update

Apple: "macOS security gets even stronger with new tools that make the Mac more resistant to attack, including Rapid Security Response that works in between normal updates to easily keep security up to date without a reboot" #cybersecurity

Go to article at
10.6.2022

Costa Rica May Be Pawn in Conti Ransomware Group’s Bid to Rebrand, Evade Sanctions

Costa Rican terveysministeriössä tulostimet menivät sekaisin tänä aamuna Hive #ransomware'ryhmän hyökkäyksen jälkeen. Kaikki järjestelmät ovat toistaiseksi alhaalla. HIVE ei ole julkaissut lunnasvaatimusta. Hyökkäykset voivat jatkua.

Go to article at
3.6.2022

Costa Rica May Be Pawn in Conti Ransomware Group’s Bid to Rebrand, Evade Sanctions

Printers at the Costa Rican government health ministry went crazy this morning after the Hive #ransomware group attacked. All systems went down until further notice. HIVE has not released their ransom fee. Attacks are expected to follow.

Go to article at
3.6.2022