Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Corporate Security Alert: Identifying Dangerous Apps on Employee Phones

This article uncovers hidden security risks of popular apps on work devices, covering social media, messaging, cloud storage, gaming, utility, health, VPN, and shopping apps, with recommendations to safeguard corporate data.

article

20.9.2024

NIS2 national legistation, ransomware and a new development forum: Cyberday product and news round-up 9/2024 🛡️

This is the September news and product review from Cyberday. Read news about ransomware, new phishing techniques and local NIS2-legistations.

article

20.9.2024

IT and OT Cyber Security: Different Environments, Different Priorities

This blog post outlines the key differences between IT and OT cyber security, focusing on their distinct areas, objectives, environments, threat landscapes, and compliance requirements.

article

4.9.2024

Cyber Security in Supply Chain Risk Management

Businesses should prioritize supply chain security by adopting best cyber security practices, fostering resilience, and promoting collaboration to protect against evolving cyber threats. Learn more about this topic in this blog post.

article

22.8.2024

Spreadsheet vs. ISMS tool - top 10 reasons why a tool is better than the traditional way

Discover the top 10 reasons why agile tools outperform traditional spreadsheets in managing cyber security compliance, from centralized management to continuous improvement.

article

22.8.2024

ISMS Essentials: Mastering a Data System Inventory for Your Organization

This post provides essential insights for maintaining a data system inventory within your organization's ISMS, detailing key processes, asset types, and tackling common challenges.

article

15.8.2024

Incident Detection: Building, Nurturing, and Continuously Improving a Proactive Environment

Shift from reactive to proactive incident detection. Use advanced tools, continuous learning, and customised strategies to anticipate and prevent issues. Focus on constant improvement and innovation to boost security and resilience.

article

15.8.2024

ISO 27001 and ISO 9001: Differences, how they work together and benefits of combining

Learn about the synergy between ISO 27001 and ISO 9001. Learn how integrating these standards enhances information security, quality management, and overall operational efficiency, using case examples and actionable insights.

article

6.6.2024

PayPal Phishing Attack Promises to Secure Accounts, Steals Everything

An ongoing phishing campaign is targeting PayPal customers with emails camouflaged as 'unusual activity' alerts warning them of suspicious logins from unknown devices and attempting to squeeze them dry of all their credentials and financial info. [...]

Go to article at
15.5.2020
Phishing

8 key security considerations for protecting remote workers

Your boss just called and all your employees are mandated to work from home for the next two to three weeks due to the potential COVID-19 pandemic. What could go wrong? What risks are you now bringing to the firm? These are the actions should you take immediately to ensure you can allow your workforce to work remotely and securely.To read this article in full, please click here (Insider Story)

Go to article at
15.5.2020
Employee Negligence

Ryuk Ransomware Forces Prosegur Security Firm to Shut Down Network

In a statement at midday today (local time), Spanish multinational security company Prosegur announced that it was the victim of a cybersecurity incident disrupting its telecommunication platform. [...]

Go to article at
15.5.2020
Ransomware

Human Error Linked to 60% of Security Breaches

Gallagher study finds companies exposed to service outages and data loss risks

Go to article at
15.5.2020
Employee Negligence

COVID-19 Testing Center Hit By Cyberattack

Hospitals around the world struggle with ever-growing waves of COVID-19 infections but the efforts in one testing center in Europe are being hampered by cybercriminal activity. [...]

Go to article at
15.5.2020
Ransomware

Why identity theft is "so easy" and what consumers can do to combat the threat

The Identity Theft Resource Center said that the significant new threat to consumer data is as simple as large organizations failing to add a password to protect their cloud-based data.The group estimates about 165 million sensitive records were exposed in 2019 when nearly 15,000 breaches of U.S. private and government organizations were uncovered, a 17% jump from the year before. Their published report mentions noteworthy "credential stuffing" attacks in 2019 included Boost Mobile, Dunkin', and Disney+. Credential stuffing refers to the exploding trend of hackers buying someone's stolen login and password from the dark web, and then using the same combination to access their other online accounts. "The reason it's so easy is because so many of us use the same password for multiple accounts," Identity Theft Resource Center COO James Lee told CBS News' Anna Werner. Werner told "CBS This Morning" that the surest protections are using different password and login combinations for different accounts.

Go to article at
15.5.2020
Phishing

Hackers accessed staff mailboxes at Italian bank Monte dei Paschi

Monte dei Paschi, one of the biggest Italian banks, suffered a cyber attack, hackers accessed the mailboxes of some employees and sent emails to clients. Italian state-owned bank Monte dei Paschi discloses a security breach, hackers have accessed the mailboxes of some employees and sent emails to clients. The news was reported by the Reuters […] The post Hackers accessed staff mailboxes at Italian bank Monte dei Paschi appeared first on Security Affairs.

Go to article at
15.5.2020
Phishing

Researchers disclose DLL loading vulnerabilities in Autodesk, Trend Micro, Kaspersky software

Updated: Privilege escalation and code execution bugs lurked in the applications.

Go to article at
15.5.2020
Unpatched Vulnerabilities

CCPA privacy requests cost business up to $275k per million consumer records

Organizations who plan on manually processing CCPA data subject requests (DSRs) or data subject access requests will spend between $140k – $275k per million consumer records they have in their systems, according to DataGrail. The CCPA went into effect on January 1, 2020, giving consumers the right to know the data collected about them, to delete data about them, and ensure their data is not sold to third-parties. The report analyzed the number of requests … More → The post CCPA privacy requests cost business up to $275k per million consumer records appeared first on Help Net Security.

Go to article at
15.5.2020
Illegal Personal Data Processing