Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Corporate Security Alert: Identifying Dangerous Apps on Employee Phones

This article uncovers hidden security risks of popular apps on work devices, covering social media, messaging, cloud storage, gaming, utility, health, VPN, and shopping apps, with recommendations to safeguard corporate data.

article

20.9.2024

NIS2 national legistation, ransomware and a new development forum: Cyberday product and news round-up 9/2024 🛡️

This is the September news and product review from Cyberday. Read news about ransomware, new phishing techniques and local NIS2-legistations.

article

20.9.2024

IT and OT Cyber Security: Different Environments, Different Priorities

This blog post outlines the key differences between IT and OT cyber security, focusing on their distinct areas, objectives, environments, threat landscapes, and compliance requirements.

article

4.9.2024

Cyber Security in Supply Chain Risk Management

Businesses should prioritize supply chain security by adopting best cyber security practices, fostering resilience, and promoting collaboration to protect against evolving cyber threats. Learn more about this topic in this blog post.

article

22.8.2024

Spreadsheet vs. ISMS tool - top 10 reasons why a tool is better than the traditional way

Discover the top 10 reasons why agile tools outperform traditional spreadsheets in managing cyber security compliance, from centralized management to continuous improvement.

article

22.8.2024

ISMS Essentials: Mastering a Data System Inventory for Your Organization

This post provides essential insights for maintaining a data system inventory within your organization's ISMS, detailing key processes, asset types, and tackling common challenges.

article

15.8.2024

Incident Detection: Building, Nurturing, and Continuously Improving a Proactive Environment

Shift from reactive to proactive incident detection. Use advanced tools, continuous learning, and customised strategies to anticipate and prevent issues. Focus on constant improvement and innovation to boost security and resilience.

article

15.8.2024

ISO 27001 and ISO 9001: Differences, how they work together and benefits of combining

Learn about the synergy between ISO 27001 and ISO 9001. Learn how integrating these standards enhances information security, quality management, and overall operational efficiency, using case examples and actionable insights.

article

6.6.2024

LastPass admits to customer data breach caused by previous breach

In Aug LastPass reported a breach - attackers planted malware on dev's computer. ⚠️ Now reports of related breach “using info obtained in prev incident”. Passwords weren't stolen but customer data was, that can cause credible #phishing.

Go to article at
2.12.2022

Security fatigue is real: Here’s how to overcome it

IT security is seen as “Department of No”. As #cybercrime economy grows fast, they want to limit the damage employees can cause. But going too far can lead to security fatigue, resulting in reckless and impulsive behavior. Read more >>

Go to article at
25.11.2022

100 people arrested in UK’s biggest fraud investigation

Over 200k victims were targeted via the iSpoof fraud website, which was taken down by Scotland Yard’s #cybercrime unit. 100 people arrested. Almost 20 people every minute were being contacted by scammers - stealing reported £50m.

Go to article at
25.11.2022

Bahamut cybermercenary group targets Android users with fake VPN apps

Active #malware campaign ongoing disquising as legitimate SecureVPN app. Main purpose of the app modifications is to extract sensitive user data and actively spy on victims’ messaging apps. Read a detailed analysis >>

Go to article at
25.11.2022

Ouch! Ransomware gang says it won’t attack AirAsia again due to the “chaotic organisation” and sloppy security of hacked airline’s network

⚠️ #Ransomware breach can also lead to gross public humiliation. Daixin gang said Air Asia, who lost data of 5M passengers and all employees, had so chaotic and poorly-secured IT infra that it refuses to repeat the attack.

Go to article at
25.11.2022

ICS cyberthreats in 2023 – what to expect

2023 #cybersecurity trends: More attacks on "real economy" - food 🌾 transport 🚢 energy ⚡ medical 💊 Rising number of political hacktivists 🦹 Ransomware towards critical infra 🏭 Rise of embedded phishing pages on legitimate sites 🎣

Go to article at
25.11.2022

Token tactics: How to prevent, detect, and respond to cloud token theft

⚠️ When we increase MFA coverage, threat actors need more sophisticated techniques to compromise resources. Recently there's been a significant increase in token theft. Read Microsoft's DART team's report on the #cybersecurity threat >>

Go to article at
18.11.2022

Google to Pay $391 Million Privacy Fine for Secretly Tracking Users' Location

391M$ fine: Google's #privacy actions deemed deceptive. ⚠️ "misled users to think they turned off location tracking, but continued to collecting data" Location is combined with behavioral data to create user profiles eg for ad targeting.

Go to article at
18.11.2022

Instagram Impersonators Target Thousands, Slipping by Microsoft's Cybersecurity

⚠️ #Phishing attack targets 22k students in the US with a "unusual login on Instagram" scam. To note: attack used a valid 41-month old domain with a good reputation, and was able to pass e.g. MS 365 and Exchange email protections.

Go to article at
18.11.2022