Copy
Share Share
Tweet Tweet
Share Share
Forward to friend Forward to friend

Weekly #cybersecurity digest

Greetings <<First Name>>! We gather you every Friday the most important cybersec news, upcoming free webinars from our team and recent Cyberday development.

Published 7.1.2022 • Read all @ Cyberday.ai

WEEK'S MOST IMPORTANT CYBER SECURITY NEWS

Morgan Stanley to pay $60 mln to resolve data security lawsuit

MS.N will pay $60 M to settle a lawsuit by customers who said bank exposed their personal data. In 2016 and 2019 the company twice failed in properly disposing data sensitive equipment, which led to unauthorized access. #cybersecurity

6.1. 02:12 · https://www.reuters.com/markets/funds/morgan-stanley-pay-60-mln-resolve-data-security-lawsuit-2022-01-02/

6 Ways to Minimize Ransomware Damage

1️⃣ Eliminate unnecessary and classify necessary data 2️⃣ Pay attention to email risks and training 3️⃣ Ensure backup processes are in place and tested 4️⃣ Include #ransomware on your disaster recovery plans More tips on the article >>

5.1. 10:49 · https://securityboulevard.com/2022/01/6-ways-to-minimize-ransomware-damage/

Hackers Target Real Estate Websites with Skimmer in Latest Supply Chain Attack

Skimmer attacks (aka formjacking) = inserting malicious code into target website to steal personal data (e.g. credit card details). Now Sotheby's Brightcove account was breached and the video player embed script tampered. #cybersecurity

5.1. 10:43 · https://thehackernews.com/2022/01/hackers-target-real-estate-websites.html

Don't copy-paste commands from webpages — you can get hacked

A technologist shows a simple trick, that demonstrates why you should never copy-paste commands directly into your terminal. Trick lies in the JS code hidden behind the PoC HTML page setup. You might not get what you see. #cybersecurity

5.1. 10:30 · https://www.bleepingcomputer.com/news/security/dont-copy-paste-commands-from-webpages-you-can-get-hacked/

Software flaws in walk-through metal detectors made them hackable

⚠️ 9 vulnerabilities in the iC module of walk-through metal detectors, used e.g. in schools, airports and gov buildings. Attacker could exploit these to e.g. change detector sensitivity or otherwise modify its data. #cybersecurity

5.1. 10:20 · https://www.hackread.com/walk-through-metal-detectors-software-flaws-hackable/

NEXT WEEK'S CYBER SECURITY WEBINARS

Admin training (part 2/5): Framework selection and asset identification

We will present configuring your ISMS with proper security standards, managing users and starting the work with asset identification.

Aleksi Pulkkanen
Starts on Wed 12.1. at 2pm · duration 30 min

ISO 27001 (part 1/5): Intro to standard and main elements of an ISMS

We will go through the basics of Cyberday and ISO 27001 and tell you, what are the benefits of complying with global infosec best practices.

Aleksi Pulkkanen
Starts on Wed 12.1. at 3pm · duration 45 min

Admin training (part 3/5): Risk management and security control implementation

We will present implementation of risk management in an organization, defining security controls and ensuring their implementation.

Aleksi Pulkkanen
Starts on Wed 19.1. at 2pm · duration 30 min

NEWS FROM CYBERDAY DEVELOPMENT TEAM

new feature

Advanced priority classification available for data assets

From the Settings page, you can now enable an advanced priority classicification for your organization's most important data assets...

small improvement

Adding multiple participants to documentation topic

Now you can add additional participants who're supporting the actual owner of a documentation topic.

new feature

Better export capabilities on Data systems list

We developed the Excel-export to include all activated data fields in the table - including optional data...

All content @ cyberday.ai

Facebook
Twitter
LinkedIn
Website
Email
Privacy notice | Update preferences | Unsubscribe 

© 2022 Agendium Ltd. All rights reserved. Cyberday.ai | Agendium Ltd, Kalevantie 2, 33100 Tampere, Finland