Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

NIS2 Compliance: Top 5 Reasons for the Manufacturing Sector

The article highlights the critical importance for manufacturers to comply with NIS2 regulations to safeguard their operations and infrastructure from cyber threats.

article

31.5.2024

Cannes Hospital data breach, the impact of AI and NIS2 evolution: the Cyberday product and news round-up 5/2024 🛡️

May's Product and News Update presents the new monthly ISMS reports as well as the Metrics page. Other topics include Cyberday's new framework DORA and recent news around the world.

article

17.5.2024

6 ways to assess security work effectiveness

Evaluating the effectiveness of your cybersecurity involves examining the adequacy of your existing security measures. This process helps you identify your current security status and determine the necessary actions to enhance and fortify.

article

3.5.2024

Best Practices from ISO 27001 for Secure System Acquisition and Development: Create your NIS2 measures

Get tips on securely acquiring and developing systems with a focus on ISO 27001, helping meet NIS2 requirements. Post explains key aspects like secure coding, acquiring secure applications and testing or publishing changes in a controlled manner.

article

16.4.2024

Build your NIS2 measures for Business Continuity and Backups with ISO 27001

This post offers insight on complying with NIS2's continuity and backup requirements using ISO 27001's best practices. It guides you through continuity planning, backup processes, challenges, and achieving compliance effectively.

article

12.4.2024

Understanding HR Security Basics for ISO 27001 & NIS2 Compliance

Discover how the crucial role of HR in information security not only shapes the corporate security culture, but also steers the organization towards ISO 27001 and NIS2 compliance, ensuring secure handling of information assets and much more.

article

5.4.2024

Access Control & MFA (NIS2 21.2): Build A Solid Foundation with ISO 27001 Best Practices

What are the requirements for access control and MFA in NIS2 and ISO 27001 and how can they be implemented successfully? Learn more about the controls, requirements, best practices and how to overcome potential challenges in this blog post.

article

4.4.2024

Potential Struggles IT Companies might Encounter with Incident Identification and Reporting Today

The complexities of incident identification and reporting in IT, touching on coordination problems, tool inadequacies, and process deficiencies. It explores modern challenges like cyber threats and alert fatigue, as well as the cognitive gap.

article

28.3.2024

Shedding light on AceCryptor and its operation

AceCryptor has been around since 2016 and operates as the cryptor-as-a-service behind tens of #malware families ➡️ This blog by ESET researchers goes through some technical details about the prevalent cryptor.

Go to article at
26.5.2023

US Department of Transportation Suffered a Massive Security Breach Impacting 237,000 Federal Employees

⚠️ US Department of Transportation had a #cybersecurity breach exposing personal data of 114k current + 123k former employees. Breach hit staff administration systems (e.g. transit benefits), not the most critical transport safety systems.

Go to article at
26.5.2023

5 useful search engines for internet‑connected devices and services

Tools for #cybersecurity pros to monitor connected devices: 🤖 Shodan gets detailed device info (IP, OS, used software, open ports) 🦾 Censys adds additional security info (e.g. vulnerabilities, SSL certificates) Continue the list... >>

Go to article at
19.5.2023

KeePass vulnerability allows attackers to access the master password

KeePass is free, open source pw manager. Researcher recently reported a related #vulnerability: ⚠️ "In KeePass 2.x before 2.54, you can recover the cleartext master password from a memory dump, even when workspace is locked / not running."

Go to article at
19.5.2023

4 Countries Join NATO Cyber Defense Center

🌐 NATO #cybersecurity center just turned 15 and announced new members: Ukraine, Ireland, Japan and Iceland. CCDCOE now has 39 members, including some non-NATO countries. Center conducts e.g. large-scale cybersec research and exercices.

Go to article at
19.5.2023

PharMerica breach impacts almost 6 million people

🚩 US pharmacy giant notified 5.8m customers of a breach where personal data was stolen (e.g. medication lists). #Ransomware group "Money Message" claimed responsibility and has published parts of the stolen data on their leak site.

Go to article at
19.5.2023

Why more transparency around cyber attacks is a good thing for everyone

NCSC: Particularly #ransomware attacks going unreported is a big concern Some related myths that are NOT TRUE: ❌ If there's no evidence of data theft, you don't need to report ❌ If you've got good offline backups, you're OK

Go to article at
12.5.2023

Turning on stealth mode: 5 simple strategies for staying under the radar online

Want to be safe and private online? These can help you: 📨 Disposable email addresses 📱 Cheap prepaid SIMs 💳 Single-use, virtual bank cards More tips in the article >> #privacy

Go to article at
12.5.2023

Hackers Are Using ChatGPT-Themed Lures to Spread Sophisticated Malware on Meta

⚠️ Meta: Hackers exploiting interest in AI chatbots to trick people into installing #malware and take over accounts This is a common trend, bad actors exploiting high-engagement topics for their benefit. Details >>

Go to article at
12.5.2023