Academy home
Blogs
Framework recap, US security & and role management: Cyberday product and news summary 3/2025 🛡️
Part of ISO 27001 collection
Part of NIS2 collection

Framework recap, US security & and role management: Cyberday product and news summary 3/2025 🛡️

ISO 27001 collection
Framework recap, US security & and role management: Cyberday product and news summary 3/2025 🛡️
NIS2 collection
Framework recap, US security & and role management: Cyberday product and news summary 3/2025 🛡️
Cyberday blog
Framework recap, US security & and role management: Cyberday product and news summary 3/2025 🛡️

This is the March news and product review from Cyberday and a summary of the first admin webinar of 2025. We will try to hold these more often this year and will announce through various channels when the next admin webinar is scheduled. You can register for the upcoming webinars on our Webinars page closer to the event.

Framework recap Q1 / 2025

NIS2

NIS2 implementation is partly delayed and no major news on the Directive has been seen at this point. Many EU countries are still finalising national legislation. The latest countries to finish the process are Romania and Slovakia. There are several reasons for the delay in implementation, such as political tensions, elections or unsuitable government coalitions. At the moment there is still a quiet period, but soon the laws will be finalized and the real enforcement activity can begin.

Interested in NIS2? Check out our NIS2 content collection.

DORA

The European Banking Authority (EBA) has updated its guidance on DORA with regard to the management of information security risks. The EU Commission has also issued a delegated regulation to describe Threat-Led Penetration Testing (TLPT). Work is continuing with supervisory authorities to obtain further information on how TLPT should be implemented. This is progressive legislation in the sense that it is not just any penetration testing but testing designed on the basis of threat intelligence. As DORA technical standards become more complete, they will also be available in Cyberday. This work is ongoing and we are actively monitoring developments. 

Read the whole article from natlawreview.com

Most important themes in Cyberday development

ISMS roles and role management

Systematic security work involves managing roles within an organisation and this is currently possible in Cyberday under the "Units and Employees" section. The administrator can link users to different roles and the process is facilitated by the ready library of roles in Cyberday. It is also possible to create your own roles. The role description can be used to generally describe the responsibilities associated with the role, as well as to fill in more detailed documentation, such as information about the credentials and the skills required for the role. Regardless of whether it is a top-level theme or a specific policy, it is now possible to link it either to an individual or, for example, to a specific role. 

Trust Center -sites

Often organisations want to make some of their reports publicly available and this is possible with the help of our trust center website. The trust center site needs to be set up separately and its settings define, for example, who can view the site, which reports are displayed there and who is the main contact person for the site. Our trust center site is convenient to include on your own website. In further development, we plan to extend the functionality of the site and in the future it will be possible to publish, for example, your own certificate on the site.

Suggestions for improvement on the organization dashboard

Now, on the dashboard, under the main structure of the management system, there is a "Recommendations for next steps" section, which makes it easy to see what further actions you can take to improve the two main values, compliance or assurance values. A short list of three different items that could be improved next is shown in the dashboard listing, but it is also possible to open a more extensive list of tasks. The order of both lists is done in such a way that the measures with the highest impact on the value are always displayed at the top. 

Other improvements

Updated risk matrix

The new updated risk matrix is now displayed on the desktop and in risk management reports. This gives you a clearer picture of your own risks and a clear view of changes as your security work moves forward.

Files page

There is now a separate Files page under the More button.

Improvements to event logs

For example, when a description is changed, the event log now also shows the old version and you can easily compare the changes made. This is also handy in cases where you accidentally edit the description, so you can easily restore the old one. 

All tasks page

We added the ability to customise the columns displayed in the table to suit your needs on the All Tasks page. This allows you to easily see, for example, which tasks have been edited in the last 24 hours.

Future themes on the development roadmap

We will actively continue to develop the product and monitor feedback from users. Future development topics include the Trust Center website, supplier surveys, NIS2 national requirements frameworks, and the sharing of job descriptions and other content. The use of AI to answer security queries is also being explored.

News roundup 3/2025

YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users

Article from thehackernews.com

YouTube videos promoting game cheats are being used to deliver a previously undocumented stealer malware called Arcane likely targeting Russian-speaking users.

"What's intriguing about this malware is how much it collects," Kaspersky said in an analysis. "It grabs account information from VPN and gaming clients, and all kinds of network utilities like ngrok, Playit, Cyberduck, FileZilla, and DynDNS."

The attack chains involve sharing links to a password-protected archive on YouTube videos, which, when opened, unpacks a start.bat batch file that's responsible for retrieving another archive file via PowerShell.

The batch file then utilizes PowerShell to launch two executables embedded within the newly downloaded archive, while also disabling Windows SmartScreen protections and every drive root folder to SmartScreen filter exceptions.

“It’s a Heist”: Auditors Slam Musk’s DOGE Initiative

Article from wired.com

Federal auditors are raising the alarm about Elon Musk’s so-called Department of Government Efficiency (DOGE), which has been accessing sensitive government systems under the pretense of conducting audits. According to experienced auditors, DOGE’s operations bear no resemblance to real government audits, lacking planning, methodology, or certified personnel.

Instead of reducing waste, DOGE’s actions—such as mass staff cuts and contract cancellations—may actually increase long-term costs. Concerns are mounting over DOGE’s access to sensitive data without proper clearances, while the young and inexperienced team bypasses traditional vetting.

“This is not an audit,” one auditor said. “It’s a heist.

DOGE to Fired CISA Staff: Email Us Your Personal Data

Article from krebsonsecurity.com

A message appeared on the website of the U.S. Cybersecurity & Infrastructure Security Agency (CISA) asking recently fired employees to send sensitive information - such as Social Security numbers - via email in a secure attachment. However, no instructions on how to send the password were given and some sent the password in the same email.

The message violates clear security practices and exposes the government to potential malware. The situation reflects a wider trend whereby the administration is bypassing established security practices in the name of speed or convenience. At the same time, Musk-led DOGE is introducing Starlink into government networks without proper risk assessment, raising questions about the lack of security clearance.

According to former top experts, the mass layoffs and replacement of the inexperienced seriously threaten the backbone of US cyber defence.

"It's not just about incompetent practices. It's about dismantling the security of the entire administration piece by piece," sums up former NSA senior cybersecurity expert Rob Joyce.

Cyber Attack halts a murder shooting trial in American court

Article from cybersecurity-insider.com

A high-profile attempted murder trial in Strafford County, New Hampshire, was abruptly postponed due to a cyberattack that disabled court operations. The trial, involving Jason Levesque and the shooting of his neighbor, had reached its final hearing when the court's IT systems were compromised.

It’s unclear whether the attack was random or targeted, but the disruption forced a delay in justice and raised concerns about the vulnerability of judicial systems to cyber threats. Experts note that such attacks—especially ransomware—can cripple critical systems for weeks or months, with wide-ranging legal and financial impacts.

Cyberattacks on courts are not just technical incidents—they’re attacks on the rule of law.

Article contents

Other related blog articles

Share article