Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Top 7 information security standards, frameworks and laws explained

Many information security frameworks are available to help organizations build their own security plans. This article provides key information about some of the most popular information security frameworks.

article

4.3.2024

ISO 27001 and NIS2: Understanding their Connection

Learn how the ISO 27001 and the NIS2 are "connected" and why they are brought up together pretty often. Understand their differences and synergy with the help of this blog post.

article

1.3.2024

Guide to Incident Detection and Reporting: Prepared for the Worst

In this guide you'll learn to navigate the incident detection and reporting process, explore various mechanisms, understand reporting, documentation, and derive crucial lessons. We also glance at other ingredients for successful incident management.

article

22.2.2024

NIS2 Overview: History, key contents and significance for top management

Get an overview of NIS2's main contents and understand how it makes top management clearly responsible for organization's information security efforts.

article

16.2.2024

Best Practices and Common Challenges of ISMS Implementation

No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.

article

14.2.2024

ISMS Guide: Top 10 ISMS Implementation Benefits

What is an ISMS and why does your organization benefit from its implementation in the long run? This blog post will give you a short guide about all the basics you need to know about an ISMS and its top 10 benefits.

article

9.2.2024

Intro to Incident Management: Definitions, benefits and best practices

Learn how an incident management process improves communication, documentation, and continuous improvement for IT organisations.

article

6.2.2024

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

Google to Pay $391 Million Privacy Fine for Secretly Tracking Users' Location

391M$ fine: Google's #privacy actions deemed deceptive. ⚠️ "misled users to think they turned off location tracking, but continued to collecting data" Location is combined with behavioral data to create user profiles eg for ad targeting.

Go to article at
18.11.2022

Instagram Impersonators Target Thousands, Slipping by Microsoft's Cybersecurity

⚠️ #Phishing attack targets 22k students in the US with a "unusual login on Instagram" scam. To note: attack used a valid 41-month old domain with a good reputation, and was able to pass e.g. MS 365 and Exchange email protections.

Go to article at
18.11.2022

It’s time. Delete your Twitter DMs

Twitter is in quite a chaos. Security people are advising to e.g. delete DMs 💬 and stop using Twitter SSO 🔐. Recently quitted Twitter employees include: - CISO - Head of Trust & Safety - CPO (privacy) - CCO (compliance) #cybersecurity

Go to article at
18.11.2022

The Biggest Phishing Breaches of 2022 and How to Avoid them for 2023

#Phishing attacks were once primitive and full of typos, but nowadays even experts have trouble identifying them. Top types in 2022: 🅰️ Typosquatting 🌐 Lookalike domains 👔 Executive impersonation 🧑‍💼 High-level employee targeting

Go to article at
11.11.2022

Mastodon: What you need to know for your security and privacy

After Elon Musk's acquisition of Twitter, Mastodon is becoming hot. Mastodon is a free, ad-free, decentralised, open-source social media, created by a German non-profit organization. If you're interested, check also these related #cybersecurity tips >>

Go to article at
11.11.2022

Australian real estate agency Harcourts suffers a data breach

Harcourts suffered a #cyberattack last month. Rental database incl. lots of sensitive data (photo IDs, signature copies, etc.). ⚡ Harcourts smoothly blames partner: "Breach occurred due to Stafflink employee using own device for work..."

Go to article at
11.11.2022

Having refused to pay ransom, health insurer Medibank sees customer data posted online by hackers

Australia's largest health insurer Medibank announced they won't pay to #ransomware gang. ⚠️ Crooks started releasing client data online, dividing insured customers to "good" & "naughty" depending on e.g. substance abuse or medical issues.

Go to article at
11.11.2022

Parcel delivery scams are on the rise: Do you know what to watch out for?

Parcel delivery scams spoof e.g. DHL / other delivery services, sending #phishing emails / SMS telling something's wrong with delivery to get users to click. 📈 Amounts are soaring as e-commerce has grown and holiday's are coming up.

Go to article at
28.10.2022

Online ticketing company “See” pwned for 2.5 years by attackers

See Tickets is a major global player in the online event ticketing. ⚠️ They suffered a #cybersecurity breach that lasted 2,5 years before spotted, only when an external person notified See Tickets about it. Breach timeline and details >>

Go to article at
28.10.2022