Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Corporate Security Alert: Identifying Dangerous Apps on Employee Phones

This article uncovers hidden security risks of popular apps on work devices, covering social media, messaging, cloud storage, gaming, utility, health, VPN, and shopping apps, with recommendations to safeguard corporate data.

article

20.9.2024

NIS2 national legistation, ransomware and a new development forum: Cyberday product and news round-up 9/2024 🛡️

This is the September news and product review from Cyberday. Read news about ransomware, new phishing techniques and local NIS2-legistations.

article

20.9.2024

IT and OT Cyber Security: Different Environments, Different Priorities

This blog post outlines the key differences between IT and OT cyber security, focusing on their distinct areas, objectives, environments, threat landscapes, and compliance requirements.

article

4.9.2024

Cyber Security in Supply Chain Risk Management

Businesses should prioritize supply chain security by adopting best cyber security practices, fostering resilience, and promoting collaboration to protect against evolving cyber threats. Learn more about this topic in this blog post.

article

22.8.2024

Spreadsheet vs. ISMS tool - top 10 reasons why a tool is better than the traditional way

Discover the top 10 reasons why agile tools outperform traditional spreadsheets in managing cyber security compliance, from centralized management to continuous improvement.

article

22.8.2024

ISMS Essentials: Mastering a Data System Inventory for Your Organization

This post provides essential insights for maintaining a data system inventory within your organization's ISMS, detailing key processes, asset types, and tackling common challenges.

article

15.8.2024

Incident Detection: Building, Nurturing, and Continuously Improving a Proactive Environment

Shift from reactive to proactive incident detection. Use advanced tools, continuous learning, and customised strategies to anticipate and prevent issues. Focus on constant improvement and innovation to boost security and resilience.

article

15.8.2024

ISO 27001 and ISO 9001: Differences, how they work together and benefits of combining

Learn about the synergy between ISO 27001 and ISO 9001. Learn how integrating these standards enhances information security, quality management, and overall operational efficiency, using case examples and actionable insights.

article

6.6.2024

Deepfakes Are a Growing Threat to Cybersecurity and Society: Europol

Europol warns of deepfakes as #cybercrime's next big weapon for creating better scams. Deepfake tech uses AI techniques to alter existing or create new audio or video content. ⚠️ Study in 2019 showed 72% of people being unaware of them.

Go to article at
6.5.2022

What’s behind the record‑high number of zero days?

Multiple research teams observed big growth in reported zero-days in 2021. Possible reasons are: ☁️ Move toward cloud hosting, mobile and IoT tech 🦹 Expanding exploit broker marketplace 🖥️ Better detection capabilities #cybersecurity

Go to article at
6.5.2022

SolarWinds Attackers Gear Up for Typosquatting Attacks

☣️ #Cybersecurity company warns of typosquatting preparation, where used infra refers to Nobelium hacker group. In these attacks criminals buy a domain that mimics a known brand (is e.g. misspelled) and use it e.g. for phising purposes.

Go to article at
6.5.2022

White House to boost support for quantum technology while boosting cybersecurity

💻 Nations race for quantum tech, which could fuel advances e.g. in AI. Quantum computers work millions of times faster than today's supercomputers. The White House adds measures for both, research and #cybersecurity towards quantum tech.

Go to article at
6.5.2022

The trouble with BEC: How to stop the costliest internet scam

FBI's IC3 reports reveal 20k BEC scams generated 2,5B$ losses in 2021, more than any other type of #cybercrime. To battle it, consider: 👥 Staff guidelines and training 💻 Advanced email security 💰 Improved payment processes

Go to article at
29.4.2022

The 15 most exploited vulnerabilities in 2021

☣️ Most exploited CVEs by attackers in 2021, compiled by #cybersecurity authorities: Log4Shell CVE-2021-40539 – in ManageEngine ProxyShell – in MS Exchange CVE-2021-26084 – in Confluence Full list in article >>

Go to article at
29.4.2022

Coca-Cola Investigates Data-Theft Claims After Ransomware Attack

#Ransomware group Stormous claims to have stolen 161GB of Coca-Cola's data - and is willing to sell it for 64k€. Case is unconfirmed & the relatively small ask is making experts suspicious of the value and even existence of stolen data.

Go to article at
29.4.2022

Facebook phishers threaten users with Page Recovery Help Support

Bogus recovery service activity on FB, trying to scare users into #phishing traps to takeover accounts and steal more FB pages for this use. ➡️ Stay aware and use MFA and good password practices to protect your account. Learn more >>

Go to article at
29.4.2022

Microsoft Discloses Onslaught of Russian Cyberattacks on Ukraine

Between 23/2-08/4, MS observed 37 destructive RUS #cyberattack's in Ukraine. ⚠️ This suggests cyber playing a bigger role in the war than previously known. Example timelines of linked cyber&military operations in the article >>

Go to article at
29.4.2022