Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

ISO 27001 and ISO 9001: Differences, how they work together and benefits of combining

Learn about the synergy between ISO 27001 and ISO 9001. Learn how integrating these standards enhances information security, quality management, and overall operational efficiency, using case examples and actionable insights.

article

6.6.2024

NIS2 Compliance: Top 5 Reasons for the Manufacturing Sector

The article highlights the critical importance for manufacturers to comply with NIS2 regulations to safeguard their operations and infrastructure from cyber threats.

article

31.5.2024

Cannes Hospital data breach, the impact of AI and NIS2 evolution: the Cyberday product and news round-up 5/2024 🛡️

May's Product and News Update presents the new monthly ISMS reports as well as the Metrics page. Other topics include Cyberday's new framework DORA and recent news around the world.

article

17.5.2024

6 ways to assess security work effectiveness

Evaluating the effectiveness of your cybersecurity involves examining the adequacy of your existing security measures. This process helps you identify your current security status and determine the necessary actions to enhance and fortify.

article

3.5.2024

Best Practices from ISO 27001 for Secure System Acquisition and Development: Create your NIS2 measures

Get tips on securely acquiring and developing systems with a focus on ISO 27001, helping meet NIS2 requirements. Post explains key aspects like secure coding, acquiring secure applications and testing or publishing changes in a controlled manner.

article

16.4.2024

Build your NIS2 measures for Business Continuity and Backups with ISO 27001

This post offers insight on complying with NIS2's continuity and backup requirements using ISO 27001's best practices. It guides you through continuity planning, backup processes, challenges, and achieving compliance effectively.

article

12.4.2024

Understanding HR Security Basics for ISO 27001 & NIS2 Compliance

Discover how the crucial role of HR in information security not only shapes the corporate security culture, but also steers the organization towards ISO 27001 and NIS2 compliance, ensuring secure handling of information assets and much more.

article

5.4.2024

Access Control & MFA (NIS2 21.2): Build A Solid Foundation with ISO 27001 Best Practices

What are the requirements for access control and MFA in NIS2 and ISO 27001 and how can they be implemented successfully? Learn more about the controls, requirements, best practices and how to overcome potential challenges in this blog post.

article

4.4.2024

Russia’s offensive cyber actions should be a cause for concern for CISOs

"We’ve been warning for weeks and months about Russian cyber threats to Ukraine and beyond". US national #cybersecurity advisor is hoping to instill a sense of urgency to CISOs everywhere to tighten up their security posture.

Go to article at
18.2.2022

How Phishers Are Slinking Their Links Into LinkedIn

⚠️ LinkedIn has a “redirect” feature for businesses. Criminals are leveraging new / hacked accounts to create their "ad" campaigns utilizing this. Due to this links you receive pointing to LinkedIn.com could forward to #phishing sites.

Go to article at
11.2.2022

Qbot needs only 30 minutes to steal your credentials, emails

Widespread #malware Qbot needs 30min after initial infection to steal browser data and emails from Outlook and 50 minutes before lateral movement to adjacent workstations. ➡️ Full attack timeline available on the article.

Go to article at
11.2.2022

“We absolutely do not care about you”: Sugar ransomware targets individuals

#Ransomware used to target only big corps. Now SMBs & individuals are frequent targets, as attacks get automated. Sugar is RaaS targeting single devices. Features a negotiation chat, "decrypt 5 files free" and an automated ransom amount.

Go to article at
11.2.2022

North Korean Missile Program Funded Through Stolen Crypto

In 1,5 years, hackers have stolen 50M$ of crypto from exchanges in US, EUR and Asia. Some sources say amount can be 400M$. This money is a "key revenue source" to fund Pyongyang's nuclear missile programme, says UN report. #cybersecurity

Go to article at
11.2.2022

CISA, FBI, NSA Issue Advisory on Severe Increase in Ransomware Attacks

⚠️ #Cybersecurity authorities from AUS, UK and US warn of increase in sophisticated ransomware targeting critical infra. Top 3 infection vectors are: 🎣 Spear-phishing 🔓 Stolen or brute-forced credentials 🤖 Exploits of software flaws

Go to article at
11.2.2022

Unpatched Security Bugs in Medical Wearables Allow Patient Tracking, Data Theft

🏥 Telehealth care is on the rise, but rush has unleashed many wearables that are vulnerable to attacks. Kaspersky found 33 vulnerabilities in MQTT data transfer protocol, putting patient data at risk to MitM attacks. #cybersecurity

Go to article at
4.2.2022

Actor’s verified Twitter profile hijacked to spam NFT giveaways

Previously Twitter account hijack scams often led to switch profile pic Elon Musk and spamming crypto links. Currently hot scam is hijacking verified profile and promoting and selling NFTs. Examples in article >> #cybersecurity

Go to article at
4.2.2022

How to tell if your phone has been hacked

Signs of a compromised phone: 🔋 battery drain 📈 data usage spikes 🔘 GPS or Wi-Fi On/Off by itself 🛑 random ad pop-ups 📱 unknown apps installed 💬 strange call / sms history Tips for keeping safe in the article. #cybersecurity

Go to article at
4.2.2022