Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Best Practices and Common Challenges of ISMS Implementation

No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.

article

14.2.2024

ISMS Guide: Top 10 ISMS Implementation Benefits

What is an ISMS and why does your organization benefit from its implementation in the long run? This blog post will give you a short guide about all the basics you need to know about an ISMS and its top 10 benefits.

article

9.2.2024

Intro to Incident Management: Definitions, benefits and best practices

Learn how an incident management process improves communication, documentation, and continuous improvement for IT organisations.

article

6.2.2024

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

This article provides an insight into the main responsibilities of a CISO, from implementing security principles to fostering collaboration. It also presents valuable tips for successful performance, emphasizing constant learning as a key ingredient.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

article

15.12.2023

7 types of virus – a short glossary of contemporary cyberbadness

Here's a short list of 7 malware categories we hope you never encounter. Sadly, it's not an exhaustive list... but it's a helpful start.

Go to article at
15.5.2020
Malware

Dexphot Malware Hijacked 80K+ Devices to Mine Cryptocurrency

A cryptomining malware has infected at least 80k devices and uses various tactics to evade detection.

Go to article at
15.5.2020
Malware

Data Breach Impacts Thousands of Fort Worth Water Customers

About 3,000 Fort Worth residents who used credit cards to pay their water bills online may have had their personal information stolen, the water department says.A city contractor, CentralSquare, determined that someone hacked into the software used to process credit card information, water department spokeswoman Mary Gugliuzza said Thursday.The customers whose data may have been stolen are being notified, she said.The stolen information may include names, addresses and credit card data, including numbers and security codes and affects customers who made online payments between Aug. 27 and Oct. 23, she said.CentralSquare is offering impacted customers free credit monitoring for one year.Customers who had set up recurring payments by credit cards were not affected by the breach unless they changed credit card numbers online between August and October, Gugliuzza said.Customers who paid by bank draft, by phone or in person also were not impacted.

Go to article at
15.5.2020
Supply Chain Attacks

Shadow IT accounts with weak passwords endanger organizations

63% of enterprise professionals have created at least one account without their IT department being aware of it, and two-thirds of those have created two or more, the results of a recent 1Password survey have revealed. Even more worryingly, only 2.6% of these 63% use a unique password when they create a new shadow IT account at work and just 13% use a password generator – the rest re-use a memorable password or use a … More → The post Shadow IT accounts with weak passwords endanger organizations appeared first on Help Net Security.

Go to article at
15.5.2020
Password Attacks

This trojan malware is being used to steal passwords and spread ransomware

A newly discovered hacking campaign by a 'sophisticated cyber criminal operation' is targeting healthcare and education organisations with custom-built, Python-based trojan malware which gives attackers almost control of Windows systems with the ability to monitor actions and steal sensitive data. Malicious functions of the remote access trojan , dubbed PyXie RAT, include keylogging, credential harvesting, recording video, cookie theft, the ability to perform man-in-the-middle attacks and the capability to deploy other forms of malware onto infected systems. However, traces of the attacks have been found and detailed by cyber security researchers at Blackberry Cylance, who named the malware PyXie because of the way its compiled code uses a '.pyx' file extension instead of the '.pyc' typically associated with Python. A third stage of the multi-level download sees PyXie RAT leverage something known in the code as 'Cobalt Mode' which connects to a command and control server as well as downloading the final payload.

Go to article at
15.5.2020
Malware

Vulnerabilities Found in GE Healthcare Patient Monitoring Products

Several potentially serious vulnerabilities have been found in patient monitoring products made by GE Healthcare, the DHS’s Cybersecurity and Infrastructure Security Agency (CISA) and healthcare cybersecurity firm CyberMDX revealed on Thursday. read more

Go to article at
15.5.2020
Unpatched Vulnerabilities

FBI Warns of Risks Behind Using Free WiFi While Traveling

The U.S. Federal Bureau of Investigation recommends travelers to avoid connecting their phone, tablet, or computer to free wireless hotspots while traveling during the holiday season. [...]

Go to article at
15.5.2020
Man-in-the-Middle Attacks

Cybersecurity Tips for Executives

Executives have a target on their backs because their credentials unlock critical chunks of company data – consider these cybersecurity tips. The post Cybersecurity Tips for Executives appeared first on JumpCloud. The post Cybersecurity Tips for Executives appeared first on Security Boulevard.

Go to article at
15.5.2020
Saved For Later,Employee Negligence

Magecart Attacks Website Collecting Australian Fire Donations

The attack may have compromised donors’ payment information. A website gathering donations for the victims of the wildfires in Australia has been hit by a credential-skimming attack, placing the payment information of donors at risk. The attack, identified as the work of Magecart, injected the ATMZOW skimmer into the charity’s website code, grabbed payment information, […] The post Magecart Attacks Website Collecting Australian Fire Donations appeared first on IT Security Guru.

Go to article at
15.5.2020
Supply Chain Attacks