Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

NIS2 national legistation, ransomware and a new development forum: Cyberday product and news round-up 9/2024 🛡️

This is the September news and product review from Cyberday. Read news about ransomware, new phishing techniques and local NIS2-legistations.

article

20.9.2024

IT and OT Cyber Security: Different Environments, Different Priorities

This blog post outlines the key differences between IT and OT cyber security, focusing on their distinct areas, objectives, environments, threat landscapes, and compliance requirements.

article

4.9.2024

Cyber Security in Supply Chain Risk Management

Businesses should prioritize supply chain security by adopting best cyber security practices, fostering resilience, and promoting collaboration to protect against evolving cyber threats. Learn more about this topic in this blog post.

article

22.8.2024

Spreadsheet vs. ISMS tool - top 10 reasons why a tool is better than the traditional way

Discover the top 10 reasons why agile tools outperform traditional spreadsheets in managing cyber security compliance, from centralized management to continuous improvement.

article

22.8.2024

ISMS Essentials: Mastering a Data System Inventory for Your Organization

This post provides essential insights for maintaining a data system inventory within your organization's ISMS, detailing key processes, asset types, and tackling common challenges.

article

15.8.2024

Incident Detection: Building, Nurturing, and Continuously Improving a Proactive Environment

Shift from reactive to proactive incident detection. Use advanced tools, continuous learning, and customised strategies to anticipate and prevent issues. Focus on constant improvement and innovation to boost security and resilience.

article

15.8.2024

ISO 27001 and ISO 9001: Differences, how they work together and benefits of combining

Learn about the synergy between ISO 27001 and ISO 9001. Learn how integrating these standards enhances information security, quality management, and overall operational efficiency, using case examples and actionable insights.

article

6.6.2024

NIS2 Compliance: Top 5 Reasons for the Manufacturing Sector

The article highlights the critical importance for manufacturers to comply with NIS2 regulations to safeguard their operations and infrastructure from cyber threats.

article

31.5.2024

Mitsubishi Electric Discloses Information Leak

Electronics manufacturer Mitsubishi waits six months to declare breach

Go to article at
15.5.2020
Illegal Personal Data Processing

Phishing Attack Says You're Exposed to Coronavirus, Spreads Malware

A new phishing campaign has been spotted that pretends to be from a local hospital telling the recipient that they have been exposed to the Coronavirus and that they need to be tested.

Go to article at
15.5.2020
Phishing

COVID-19 Phishing Update: Infected Coworker Email Targets Enterprise O365 Credentials

Threat actors are exploiting employee concerns about infected colleagues. Our latest example targets Office 365 accounts at a large Canadian company by falsely claiming a colleague has died from the virus. 

Go to article at
15.5.2020
Saved For Later,Phishing

How to Use Google Chrome Extensions and Themes in Microsoft Edge

Microsoft's new Edge browser is now available and it comes with an add-on store where you can find Microsoft-approved extensions. As Edge is built on the same Chromium code base, it can also access the Chrome Web Store. [...]

Go to article at
15.5.2020
CyberNow

Ransomware attack freezes health records access at 110 nursing homes

In some cases, nurses can’t update and order drugs. For one assisted-living facility, lack of timely Medicaid billing could force closure.

Go to article at
15.5.2020
Ransomware

Tor Project cut a third of its staff due to the Coronavirus

The Tor Project cut a third of its staff due to the economic impact of the ongoing Coronavirus outbreak, 13 staffers out of 35 left the team. The ongoing Coronavirus outbreak has a significant impact on the Tor Project that was forced to cut a third of its staff due to the economic impact of […] The post Tor Project cut a third of its staff due to the Coronavirus appeared first on Security Affairs.

Go to article at
15.5.2020
CyberNow

Tax rebate scam emails target concerned households during coronavirus crisis

Hackers are exploiting the hardship and concerns faced by households across the country with false emails claiming to offer support in the form of a tax rebate.

Go to article at
15.5.2020
Phishing

Fake Steam skin giveaway site tricks users into sharing their login credentials

The scam is promoted through comments made to Steam profiles. To make it look legitimate, the phishing site contains a fake chat screen running on the left-hand side of the page.

Go to article at
15.5.2020
Phishing

The Top 10 State of Security Blog Posts from 2019

It’s been another fantastic year on The State of Security blog. With over 350 blogs published from all walks of the security community, we like to think of the blog as more of an industry resource that caters to not only experienced security professionals but also to those who are new to the community. To […]… Read MoreThe post The Top 10 State of Security Blog Posts from 2019 appeared first on The State of Security.

Go to article at
15.5.2020
CyberNow