Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Corporate Security Alert: Identifying Dangerous Apps on Employee Phones

This article uncovers hidden security risks of popular apps on work devices, covering social media, messaging, cloud storage, gaming, utility, health, VPN, and shopping apps, with recommendations to safeguard corporate data.

article

20.9.2024

NIS2 national legistation, ransomware and a new development forum: Cyberday product and news round-up 9/2024 🛡️

This is the September news and product review from Cyberday. Read news about ransomware, new phishing techniques and local NIS2-legistations.

article

20.9.2024

IT and OT Cyber Security: Different Environments, Different Priorities

This blog post outlines the key differences between IT and OT cyber security, focusing on their distinct areas, objectives, environments, threat landscapes, and compliance requirements.

article

4.9.2024

Cyber Security in Supply Chain Risk Management

Businesses should prioritize supply chain security by adopting best cyber security practices, fostering resilience, and promoting collaboration to protect against evolving cyber threats. Learn more about this topic in this blog post.

article

22.8.2024

Spreadsheet vs. ISMS tool - top 10 reasons why a tool is better than the traditional way

Discover the top 10 reasons why agile tools outperform traditional spreadsheets in managing cyber security compliance, from centralized management to continuous improvement.

article

22.8.2024

ISMS Essentials: Mastering a Data System Inventory for Your Organization

This post provides essential insights for maintaining a data system inventory within your organization's ISMS, detailing key processes, asset types, and tackling common challenges.

article

15.8.2024

Incident Detection: Building, Nurturing, and Continuously Improving a Proactive Environment

Shift from reactive to proactive incident detection. Use advanced tools, continuous learning, and customised strategies to anticipate and prevent issues. Focus on constant improvement and innovation to boost security and resilience.

article

15.8.2024

ISO 27001 and ISO 9001: Differences, how they work together and benefits of combining

Learn about the synergy between ISO 27001 and ISO 9001. Learn how integrating these standards enhances information security, quality management, and overall operational efficiency, using case examples and actionable insights.

article

6.6.2024

Ex-Twitter exec blows the whistle, alleging reckless and negligent cybersecurity policies

💣 Ex-Twitter head of sec paints a pic of mismanaged company that hides issues, swindles regulators and secures data poorly. Zatko b4 held roles on Google & DoD. Fired from Twitter due to poor leadership and performance. #cybersecurity

Go to article at
26.8.2022

Is your personal data all over the internet? 7 steps to cleaning up your online presence

Minimizing your digital footprint: 🔀 Check privacy settings (e.g. in FB) 🔍 Google yourself & contact sites to remove unwanted content 🚫 Delete old posts You can also have Google remove your personal data - there's a tool. #privacy

Go to article at
26.8.2022

Meet Borat RAT, a New Unique Triple Threat

RAT #malware typically helps attacker gain control of a system, permitting access to network resources, files, and control mouse and keyboard. ☣️ Borat RAT goes beyond - deploying ransomware and DDoS attacks. Learn more from article >>

Go to article at
26.8.2022

Over 80,000 exploitable Hikvision cameras exposed online

Researchers discovered 80,000 Hikvision cameras w/ command injection #vulnerability - easily exploitable by sending specially crafted messages to server. ⚠️ Patch available for months, but thousands of organizations have not applied it.

Go to article at
26.8.2022

How a spoofed email passed the SPF check and landed in my inbox

📧 SPF lets you publish DNS records to define IPs allowed to use the domain for sending email. Article explains this must-have safeguard + examples where careless SPF records allowed bad actors to impersonate a corporation. #phishing

Go to article at
19.8.2022

Exploit out for critical Realtek flaw affecting many networking devices

⚠️ Exploit code released, zero-click #vulnerability (CVSS 9.8/10) affecting millions of devices with Realtek’s RTL819x SoC. Attacker can compromise e.g. routers from many brands. Patch available - check if your equipment is vulnerable.

Go to article at
19.8.2022

RubyGems now requires multi-factor auth for top package maintainers

Software package registry RubyGems requires top admins to secure accounts w/ MFA. Registries like PyPI and npm are doing the same. ⚠️ This relates to growing trend, where criminals steal accounts to publish rogue software. #cybersecurity

Go to article at
19.8.2022

U.K. Water Supplier Hit With Clop Ransomware Attack

⚠️ U.K. water supplier hit by Clop #ransomware. Attack didn't stop water supply. As ransom wasn't paid, breached data (incl. passports, data system screenshots) was published. Trend continues: critical infra a top target for cybercrime.

Go to article at
19.8.2022

Ransomware, email compromise are top security threats, but deepfakes increase

#Cybersecurity threat reports (2021-2022) from VMware and Palo Alto Unit 42: ☢️ Most common threats: Ransomware, business email compromise (BEC) 📈 Increasing rapidly: Deepfakes, zero-day vulnerability exploits, API hacks

Go to article at
12.8.2022