Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

NIS2 Compliance: Top 5 Reasons for the Manufacturing Sector

The article highlights the critical importance for manufacturers to comply with NIS2 regulations to safeguard their operations and infrastructure from cyber threats.

article

31.5.2024

Cannes Hospital data breach, the impact of AI and NIS2 evolution: the Cyberday product and news round-up 5/2024 🛡️

May's Product and News Update presents the new monthly ISMS reports as well as the Metrics page. Other topics include Cyberday's new framework DORA and recent news around the world.

article

17.5.2024

6 ways to assess security work effectiveness

Evaluating the effectiveness of your cybersecurity involves examining the adequacy of your existing security measures. This process helps you identify your current security status and determine the necessary actions to enhance and fortify.

article

3.5.2024

Best Practices from ISO 27001 for Secure System Acquisition and Development: Create your NIS2 measures

Get tips on securely acquiring and developing systems with a focus on ISO 27001, helping meet NIS2 requirements. Post explains key aspects like secure coding, acquiring secure applications and testing or publishing changes in a controlled manner.

article

16.4.2024

Build your NIS2 measures for Business Continuity and Backups with ISO 27001

This post offers insight on complying with NIS2's continuity and backup requirements using ISO 27001's best practices. It guides you through continuity planning, backup processes, challenges, and achieving compliance effectively.

article

12.4.2024

Understanding HR Security Basics for ISO 27001 & NIS2 Compliance

Discover how the crucial role of HR in information security not only shapes the corporate security culture, but also steers the organization towards ISO 27001 and NIS2 compliance, ensuring secure handling of information assets and much more.

article

5.4.2024

Access Control & MFA (NIS2 21.2): Build A Solid Foundation with ISO 27001 Best Practices

What are the requirements for access control and MFA in NIS2 and ISO 27001 and how can they be implemented successfully? Learn more about the controls, requirements, best practices and how to overcome potential challenges in this blog post.

article

4.4.2024

Potential Struggles IT Companies might Encounter with Incident Identification and Reporting Today

The complexities of incident identification and reporting in IT, touching on coordination problems, tool inadequacies, and process deficiencies. It explores modern challenges like cyber threats and alert fatigue, as well as the cognitive gap.

article

28.3.2024

For password protection, dump LastPass for open source Bitwarden

In Dec, LastPass said August #cybersecurity incident had been worse than admitted. Instead of losing internal docs, they lost customer vault data. This article tells about an alternate tool to protect and organize passwords - Bitwarden.

Go to article at
20.1.2023

Ransomware severs 1,000 ships from on-shore servers

Pirating from the comfort of your home? Latest case of transport industry #cyberattack's is ShipManager, a maritime mgmt business, after ransomware forced its software offline and left 1,000 ships w/o connection to on-shore servers.

Go to article at
20.1.2023

Norton LifeLock Discloses Breach Affecting Thousands of Customer Accounts

Norton LifeLock breach may allow hackers access to password vaults. This was a credential stuffing attack — where previously leaked creds used to access accounts with same passwords. MFA and password changes help prevent. #cybersecurity

Go to article at
20.1.2023

A Fifth Of Passwords Used By Federal Agency Cracked In Security Audit

⚠️ Audit on DoI found 21% of employee AD passwords weak enough to be cracked using standard methods in couple of hours (feat. all-time favourites like Password1234 and ChangeItN0w). 362 of affected employees were senior. #cybersecurity

Go to article at
13.1.2023

ChatGPT-Written Malware

🤖 ChatGPT-written #malware is starting to be seen in the wild. Generated code isn’t yet that good. But the trend is worrying, as the tech will get better and can give less skilled hackers - aka script kiddies - new capabilities.

Go to article at
13.1.2023

Researchers Could Track The GPS Location Of All Of California's New Digital License Plates

Team of #cybersecurity researchers gained admin access into Reviver, the sole provider of digital licence places in California. ⚠️ Access allowed them to e.g. track the physical GPS location of all Reviver customers.

Go to article at
13.1.2023

Multiple Danish Banks Disrupted By DDoS Cyber-Attack

Recent DDoS attack on Denmark's central bank and IT partner Bankdata disrupted services of total 8 Danish banks this week. 📈 DDoS attacks grow rapidly worldwide. They're a big threat when high availability is critical. #cybersecurity

Go to article at
13.1.2023

Royal Mail cyberattack linked to LockBit ransomware operation

📮 #Cyberattack on Royal Mail halted its international shipping. This was #ransomware attack by LockBit gang, someone using Lockbit Black - their latest encryptor. Attack crippled shipping devices and caused ransom notes to print.

Go to article at
13.1.2023

4 Most Common Cyberattack Patterns from 2022

Challenging year for security teams with e.g. war in Europe, persistently remote workforce and a series of large-scale #cyberattack's. Common patterns: 💰 Ransomware 📨 Email compromise 🏭 Supply chain attacks 🤖 IoT device attacks

Go to article at
23.12.2022