Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Best Practices and Common Challenges of ISMS Implementation

No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.

article

14.2.2024

ISMS Guide: Top 10 ISMS Implementation Benefits

What is an ISMS and why does your organization benefit from its implementation in the long run? This blog post will give you a short guide about all the basics you need to know about an ISMS and its top 10 benefits.

article

9.2.2024

Intro to Incident Management: Definitions, benefits and best practices

Learn how an incident management process improves communication, documentation, and continuous improvement for IT organisations.

article

6.2.2024

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

This article provides an insight into the main responsibilities of a CISO, from implementing security principles to fostering collaboration. It also presents valuable tips for successful performance, emphasizing constant learning as a key ingredient.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

article

15.12.2023

Illinois Hospital Closure Showcases Ransomware's Existential Threat

🏥 Illinois Hospital suffered a devastating #ransomware attack in 2021, forcing employees to pen&paper for months with no access to main IT systems. Now this hospital is ceasing operations permanently, due to this and other challenges.

Go to article at
16.6.2023

Understanding Malware-as-a-Service

☢️ MaaS is a way for top cybercriminals to cash in, as they sell their malware to (often) less proficient attackers. At the same time it lowers the bar for entering #cybercrime community. Learn more about MaaS market >>

Go to article at
16.6.2023

LockBit victims in the US alone paid over $90m in ransoms since 2020

⚠️ Seven nations (e.g. USA, UK, Germany) issued a joint security advisory about LockBit #ransomware gang. Advisory is a manual for identifying, stopping and reporting LockBit activity, which has cost > $90m for only US victims in 3 years.

Go to article at
16.6.2023

People Are Pirating GPT-4 By Scraping Exposed API Keys

💳 To use OpenAI's LLMs (eg GPT-4), you need an OpenAI account w/ credit card. Some authors have left API keys exposed in their publicly accessible code - and now access to accounts with upto 150k$ usage are offered online. #cybercrime

Go to article at
9.6.2023

New PowerDrop Malware Targeting U.S. Aerospace Industry

⚠️ Novel #malware found implanted in an unnamed domestic aerospace defense contractor last month. "PowerDrop uses advanced techniques to evade detection such as deception, encoding, and encryption" #cybersecurity #criticalinfra

Go to article at
9.6.2023

7 tips for spotting a fake mobile app

📱 Many apps are after your money or personal data. Remember when downloading apps: ✅ Check the developer’s pedigree 📵 Look out for excessive app permissions Other similar tips for #cybersecurity in the article >>

Go to article at
9.6.2023

Deepfake Cyber Attack Hits Russia: Fake Putin Message Broadcasted

📺 Hacker snuck in a fabricated message from Putin to russian radio and TV. Audio deepfakes are becoming very feasible with current tech. Convincing video deepfakes are more of a challenge, for now. #cybersecurity

Go to article at
9.6.2023

Volt Typhoon targets US critical infrastructure with living-off-the-land techniques

Volt Typhoon is a state-sponsored actor, active since mid-2021 that targets critical infrastructure in the US. ➡️ This blog from MS describes their tactics for achieving / maintaining unauthorized access to target networks. #cybersecurity

Go to article at
26.5.2023

OpenAI Leaders Call For Regulation To Prevent AI Destroying Humanity

ChatGPT founders call for a regulator to: ⚖️ place restrictions on AI 🔎 audit AI systems ✔️ test for compliance with safety standards in order to combat e.g. lock-in effects and becoming completely dependent on machines. #cybersecurity

Go to article at
26.5.2023