Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Cannes Hospital data breach, the impact of AI and NIS2 evolution: the Cyberday product and news round-up 5/2024 🛡️

May's Product and News Update presents the new monthly ISMS reports as well as the Metrics page. Other topics include Cyberday's new framework DORA and recent news around the world.

article

17.5.2024

6 ways to assess security work effectiveness

Evaluating the effectiveness of your cybersecurity involves examining the adequacy of your existing security measures. This process helps you identify your current security status and determine the necessary actions to enhance and fortify.

article

3.5.2024

System acquisition and development in NIS2: Suggested best practices

Get tips on securely acquiring and developing systems with a focus on ISO 27001, helping meet NIS2 requirements. Post explains key aspects like secure coding, acquiring secure applications and testing or publishing changes in a controlled manner.

article

16.4.2024

Continuity management in NIS2: Benchmark measures for business continuity and backups with ISO 27001

This post offers insight on complying with NIS2's continuity and backup requirements using ISO 27001's best practices. It guides you through continuity planning, backup processes, challenges, and achieving compliance effectively.

article

12.4.2024

HR security in NIS2: Best practices for compliance

Learn how HR drives ISO 27001 and NIS2 compliance through security training, roles, and policies essential for building a strong information security culture.

article

5.4.2024

Access control & MFA in NIS2: Build a solid foundation with ISO 27001 controls

What are the requirements for access control and MFA in NIS2 and ISO 27001 and how can they be implemented successfully? Learn more about the controls, requirements, best practices and how to overcome potential challenges in this blog post.

article

4.4.2024

Potential Struggles IT Companies might Encounter with Incident Identification and Reporting Today

The complexities of incident identification and reporting in IT, touching on coordination problems, tool inadequacies, and process deficiencies. It explores modern challenges like cyber threats and alert fatigue, as well as the cognitive gap.

article

28.3.2024

Information Security Risk Management: A Step-by-step Guide to a Clear Process

Get a step-by-step guide on managing information security risks, from asset identification to monitoring, essential for navigating growing cybersecurity threats.

article

21.3.2024

Outlining the redress mechanism in the EU-US Data Privacy Framework

On Oct 7 President Biden signed an Executive Order furthering EU-U.S. Data Privacy Framework. This addresses #privacy concerns from CJEU - limiting access to EU data by US intelligence services and creating a Data Protection Review Court.

Go to article at
14.10.2022

AI and Residual Finger Heat Could Be a Password Cracker's Latest Tools

⚠️ Researchers created ThermoSecure, a cheap method bad actors might use to crack passwords. It analyzes heat signatures from thermal cameras with AI to guess a password with 86% accuracy (when image taken in 20 seconds). #cybersecurity

Go to article at
14.10.2022

Consumers want more transparency on how companies manage their data

On Oct 7 President Biden signed an Executive Order furthering EU-U.S. Data Privacy Framework. This addresses #privacy concerns from CJEU - limiting access to EU data by US intelligence services and creating a Data Protection Review Court.

Go to article at
14.10.2022

Google Rolling Out Passkey Passwordless Login Support to Android and Chrome

🔑 Passkeys aim to replace standard passwords with unique digital keys that are stored locally on the device. "They cannot be reused, don't leak in server breaches, and protect users from #phishing attacks."

Go to article at
14.10.2022

Popular YouTube Channel Caught Distributing Malicious Tor Browser Installer

HK based popular YouTube channel used as a means for distributing malicious Tor-version. Browser's own website is blocked in China. ⚠️ #Malware campaigns using hacked channels and video description links are getting more and more popular.

Go to article at
7.10.2022

8 strange ways employees can (accidently) expose data

Article has interesting "warning examples" for sensitive data exposure, incl.: 📣 LinkedIn career updates 🖨️ discarded office printers 🖼️ social media pics 📧 emails sent to personal accounts 👓 even eyeglass reflections #cybersecurity

Go to article at
7.10.2022

Steam Gaming Phish Showcases Browser-in-Browser Threat

⚠️ Browser-in-the-browser is a novel #phishing tactic that should be on security radars. An authentic-looking fake browser window (e.g. a login form) is deployed to steal credentials and take over accounts. Steam users are now targeted >>

Go to article at
7.10.2022

Former Uber CSO convicted for covering up massive 2016 data theft

Former Uber CSO and DoJ #cybercrime prosecutor guilty of hiding Uber data theft. In 2016 crooks stole 57M customer records from Uber systems. Crooks were paid a ransom to cover up the incident, though law requires disclosing breaches.

Go to article at
7.10.2022

Lazarus hackers abuse Dell driver bug using new FudModule rootkit

☢️ North Korean hacking group spotted exploiting Dell driver CVE in its spear #phishing attacks. Attack disguises as a "job offer" to spy and steal data from carefully selected targets (e.g. aerospace experts, political journalists).

Go to article at
7.10.2022