Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Agendium Ltd is now Cyberday Inc.!

We are thrilled to announce that our company is entering an exciting new chapter with an updated brand, from Agendium Ltd to Cyberday Inc, our new name better reflects our entity, and the direction we are heading.

article

24.10.2024

10 compliance traps & how to avoid them

Explore crucial cyber security compliance pitfalls for SMEs, from outdated policies to insider threats, and learn effective strategies to mitigate risks and enhance security measures.

article

18.10.2024

ISO 9001 standard: A peek inside the Quality framework

This blog post explores ISO 9001, the globally recognized standard for quality management systems (QMS), benefits for utilizing the standard and its significance in today’s competitive business environment.

article

8.10.2024

Navigating the Cybersecurity Maze: Master NIS2 with the help of ISO 27001

Learn how to master NIS2 with ISO 27001 and grab our free NIS2 e-book! This blog post was originally written for the Cyber Security Nordic 2024 event where Cyderday is presented as Strategic partner.

article

3.10.2024

Corporate Security Alert: Identifying Dangerous Apps on Employee Phones

This article uncovers hidden security risks of popular apps on work devices, covering social media, messaging, cloud storage, gaming, utility, health, VPN, and shopping apps, with recommendations to safeguard corporate data.

article

20.9.2024

NIS2 national legistation, ransomware and a new development forum: Cyberday product and news round-up 9/2024 🛡️

This is the September news and product review from Cyberday. Read news about ransomware, new phishing techniques and local NIS2-legistations.

article

20.9.2024

IT and OT Cyber Security: Different Environments, Different Priorities

This blog post outlines the key differences between IT and OT cyber security, focusing on their distinct areas, objectives, environments, threat landscapes, and compliance requirements.

article

4.9.2024

Cyber Security in Supply Chain Risk Management

Businesses should prioritize supply chain security by adopting best cyber security practices, fostering resilience, and promoting collaboration to protect against evolving cyber threats. Learn more about this topic in this blog post.

article

22.8.2024

Fake ChatGPT Chrome Browser Extension Caught Hijacking Facebook Accounts

⚠️ "ChatGPT For Google", #malware version of real browser add-on, got 9k installations in 30 days. Extension harvested FB session cookies to hijack accounts. After this? Password change > Name / pic change > Extremist propaganda sharing

Go to article at
24.3.2023

Hackers Drain Bitcoin ATMs Of $1.5 Million By Exploiting 0-Day Bug

Bitcoin ATMs allow people exchange bitcoin for other currencies. A threat actor exploited a #vulnerability to use the interface to upload and execute a malicious Java app and drain 56 BTC from accounts - roughly worth $1.5 million.

Go to article at
24.3.2023

Employees Are Entering Sensitive Business Data Into ChatGPT

Content input to ChatGPT is used by OpenAI to train the AI. ⛔ Data shows 4.9% of users have at least once pasted company data into ChatGPT. Firms like JP Morgan and Verizon have blocked access to ChatGPT over such concerns. #privacy

Go to article at
17.3.2023

Business on the dark web: deals and regulatory mechanisms

🦹 Hundreds of deals get made on the dark web daily: selling data, dealing illegal services, hiring crooks - with big money on the table.  Article gives insight into dark web transactions and escrow services >> #cybersecurity

Go to article at
17.3.2023

Microsoft Warns of Large-Scale Use of Phishing Kits to Send Millions of Emails Daily

⚠️ New AiTM #phishing kit (sold for 300$/mo) is growing fast in cybercrime world. AiTM phishing involves intercepting password and session cookies by deploying a proxy server between the user and the website - and can thus go around MFA.

Go to article at
17.3.2023

Exfiltration malware takes center stage in cybersecurity concerns

📈 Spike in #malware designed to exfiltrate data directly from devices and browsers. Infostealers let cybercriminals to work at scale - stealing credentials, cookies, and auto-fill data to use in targeted attacks or sell on the darknet.

Go to article at
17.3.2023

LockBit Claims it Stole SpaceX Schematics From Parts Supplier, Threatens to Leak Them

⚠️ #Ransomware gang boasts breaking into Maximum Industries, SpaceX supplier, and stealing 3,000 "certified rocket part drawings". LockBit's other recent alleged victims include e.g. ION and Royal Mail.

Go to article at
17.3.2023

Fortinet warns of new critical unauthenticated RCE vulnerability

"Critical" buffer underflow #vulnerability (CVSS 9.3) impacting FortiOS and FortiProxy disclosed. Allows unauthenticated attacker to execute arbitrary code or perform DoS on vulnerable devices. Updates and workarounds in article >>

Go to article at
10.3.2023

Ransomware review: March 2023

Recent #ransomware numbers: ☢️ LockBit alone leaked data of 126 victim organizations on its leak site during February 2023 🏭 Services, logistics and tech top industries 🦹 Medusa a new active gang

Go to article at
10.3.2023