Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Best Practices and Common Challenges of ISMS Implementation

No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.

article

14.2.2024

ISMS Guide: Top 10 ISMS Implementation Benefits

What is an ISMS and why does your organization benefit from its implementation in the long run? This blog post will give you a short guide about all the basics you need to know about an ISMS and its top 10 benefits.

article

9.2.2024

Intro to Incident Management: Definitions, benefits and best practices

Learn how an incident management process improves communication, documentation, and continuous improvement for IT organisations.

article

6.2.2024

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

This article provides an insight into the main responsibilities of a CISO, from implementing security principles to fostering collaboration. It also presents valuable tips for successful performance, emphasizing constant learning as a key ingredient.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

article

15.12.2023

Phishing Campaign Uses Mathematical Symbols to Trick AI-based Spam Detectors

📨 In a “New eVoice” phishing email impersonating Verizon, the letter V of the logo had been replaced with nearby symbols (e.g. ✔️) so that AI-based security systems would not detect the brand impersonation. #cybersecurity

Go to article at
14.10.2021

Microsoft Fended Off a Record 2.4 Tbps DDoS Attack Targeting Azure Customers

DDoS attack on Azure environment came from a botnet of estimated 70,000 "infected devices". ⚠️ Growing attacks (lately also Yandex) tell of a frightening ability to overwhelm a desired service with huge traffic. #cybersecurity

Go to article at
14.10.2021

Why Does The Internet Keep Breaking?

As part of "routine maintenance", engineers accidentally disconnected Facebook data centres from the wider internet. ⚠️ Reliance on few companies to deliver huge portion of Internet is making global outages more frequent. #cybersecurity

Go to article at
14.10.2021

Ransomware operators behind hundreds of attacks arrested in Ukraine

🚨 2 ransomware gang members arrested, w/ 100 attacks and $150 million in damages - face up to 12 years in prison. Authorities increasingly target individual members as a way to disrupt gang's activities and spread fear. #cybersecurity

Go to article at
8.10.2021

Ransomware: what protects against it best? | Kaspersky official blog

🧪 AV-TEST tested some eading ransomware solutions. 3 scenarios and 113 attack samples brought protection results from 33% - 100%. All security solutions promise to deliver, but in practice work quite differently. #cybersecurity

Go to article at
8.10.2021

Creating Wireless Signals with Ethernet Cable to Steal Data from Air-Gapped Systems

Example of interesting data exfiltration mechanism, "LANtenna Attack": 📡 employs Ethernet cables as a "transmitting antenna" to stealthily siphon highly-sensitive data from air-gapped systems #cybersecurity

Go to article at
8.10.2021

Why today’s cybersecurity threats are more dangerous

4 examples of drivers for added #cybersecurity danger: ⚠️ growing interdependence and complexity in systems ⚠️ lower barriers for entry to cybercrime ⚠️ unsecured IoT devices ⚠️ ransomware business too profitable for attackers

Go to article at
8.10.2021

What Happened to Facebook, Instagram, & WhatsApp?

On Monday, Facebook revoked GDP records, i.e. took away the map telling the world’s computers how to find its various online properties. Read more about the nasty outage from Brian Krebs. #cybersecurity

Go to article at
8.10.2021

Uusi huijaus kiusaa nettikirppisten käyttäjiä – "Kortti niistetään niin tyhjäksi kuin pystytään", varoittaa asiantuntija

⚠️ On peer-to-peer websites (e.g. Tori.fi), a scam is accelerating that phishes steals credit card info. An interested buyer sends an SMS with a link, for example, to arrange a postal delivery. Beware of suspicious links! #cybersecurity

Go to article at
1.10.2021