Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Agendium Ltd is now Cyberday Inc.!

We are thrilled to announce that our company is entering an exciting new chapter with an updated brand, from Agendium Ltd to Cyberday Inc, our new name better reflects our entity, and the direction we are heading.

article

24.10.2024

10 compliance traps & how to avoid them

Explore crucial cyber security compliance pitfalls for SMEs, from outdated policies to insider threats, and learn effective strategies to mitigate risks and enhance security measures.

article

18.10.2024

ISO 9001 standard: A peek inside the Quality framework

This blog post explores ISO 9001, the globally recognized standard for quality management systems (QMS), benefits for utilizing the standard and its significance in today’s competitive business environment.

article

8.10.2024

Navigating the Cybersecurity Maze: Master NIS2 with the help of ISO 27001

Learn how to master NIS2 with ISO 27001 and grab our free NIS2 e-book! This blog post was originally written for the Cyber Security Nordic 2024 event where Cyderday is presented as Strategic partner.

article

3.10.2024

Corporate Security Alert: Identifying Dangerous Apps on Employee Phones

This article uncovers hidden security risks of popular apps on work devices, covering social media, messaging, cloud storage, gaming, utility, health, VPN, and shopping apps, with recommendations to safeguard corporate data.

article

20.9.2024

NIS2 national legistation, ransomware and a new development forum: Cyberday product and news round-up 9/2024 🛡️

This is the September news and product review from Cyberday. Read news about ransomware, new phishing techniques and local NIS2-legistations.

article

20.9.2024

IT and OT Cyber Security: Different Environments, Different Priorities

This blog post outlines the key differences between IT and OT cyber security, focusing on their distinct areas, objectives, environments, threat landscapes, and compliance requirements.

article

4.9.2024

Cyber Security in Supply Chain Risk Management

Businesses should prioritize supply chain security by adopting best cyber security practices, fostering resilience, and promoting collaboration to protect against evolving cyber threats. Learn more about this topic in this blog post.

article

22.8.2024

Ensuring the Security and Efficiency of Web Applications and Systems

💡Protecting data and applications from potential attacks is a critical aspect of web application security. By consistently prioritizing security measures, organizations can build user confidence and strengthen their reputation. #cybersecurity

Go to article at
2.5.2024

AI's Offensive & Defensive Impacts

This Palo Alto blog interview targets specifically AI offence and defence impact, and aims to identify realistic expectations and applications of AI in cybersecurity amidst the ongoing hype. 🤖🛡️ #cybersecurity

Go to article at
2.5.2024

Dropbox dropped the ball on security, haemorrhaging customer and third-party info

🚨 Dropbox has disclosed a significant #cyberattack on its eSignature platform, where unauthorized access to customers' personal information occurred. The breach led to the exposure of data such as contact info and authentication details📍

Go to article at
2.5.2024

7 reasons why cybercriminals want your personal data

Kun vuorovaikutus teknologian kanssa syvenee, digitaalinen jalanjälkemme kasvaa ja jättää arvokkaita tietoja, joita kyberrikolliset saattavat käyttää hyväkseen. Mutta miksi datamme on niin houkuttelevaa? 🔒 #privacy

Go to article at
26.4.2024

7 reasons why cybercriminals want your personal data

As our interactions with digital technology deepen, our digital footprints expand, leaving a trail of valuable data that can be exploited by cybercriminals. But why our data is so appealing? Check also tips to protect yourself. 🔒 #privacy

Go to article at
26.4.2024

Nespresso Domain Serves Up Steamy Cup of Phish, No Cream or Sugar

☕️ A phishing campaign has been exploiting a bug on Nespresso's website to bypass security measures by using nested or hidden links. This method exploits an open redirect vulnerability, redirecting victims from trusted domain. 🎣 #phishing

Go to article at
26.4.2024

Cannes Hospital Cancels Medical Procedures Following Cyberattack

🛡️ The Cannes Hospital recently experienced a #cyberattack, leading to a complete shutdown of computer systems as a containment measure. This forced hospital staff to revert to manual, paper-based methods to continue patient care. ✍️

Go to article at
26.4.2024

IT and Cybersecurity Jobs in the Age of Emerging AI Technologies

AI is significantly reshaping the IT and cybersecurity industries. There's concerns, but it also fosters innovation and operational efficiency and In cybersecurity, AI can help mitigate growing threats from cyberattacks. 🤖 #cybersecurity

Go to article at
26.4.2024

Behavioral Patterns of Ransomware Groups are Changing

📈 This report details significant changes in the ransomware threat landscape: Near 20% increase in ransomware victims. and major shifts in tactics by RaaS groups, particularly after law enforcement interventions. 🚨 #ransomware

Go to article at
26.4.2024