Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Agendium Ltd is now Cyberday Inc.!

We are thrilled to announce that our company is entering an exciting new chapter with an updated brand, from Agendium Ltd to Cyberday Inc, our new name better reflects our entity, and the direction we are heading.

article

24.10.2024

10 compliance traps & how to avoid them

Explore crucial cyber security compliance pitfalls for SMEs, from outdated policies to insider threats, and learn effective strategies to mitigate risks and enhance security measures.

article

18.10.2024

ISO 9001 standard: A peek inside the Quality framework

This blog post explores ISO 9001, the globally recognized standard for quality management systems (QMS), benefits for utilizing the standard and its significance in today’s competitive business environment.

article

8.10.2024

Navigating the Cybersecurity Maze: Master NIS2 with the help of ISO 27001

Learn how to master NIS2 with ISO 27001 and grab our free NIS2 e-book! This blog post was originally written for the Cyber Security Nordic 2024 event where Cyderday is presented as Strategic partner.

article

3.10.2024

Corporate Security Alert: Identifying Dangerous Apps on Employee Phones

This article uncovers hidden security risks of popular apps on work devices, covering social media, messaging, cloud storage, gaming, utility, health, VPN, and shopping apps, with recommendations to safeguard corporate data.

article

20.9.2024

NIS2 national legistation, ransomware and a new development forum: Cyberday product and news round-up 9/2024 🛡️

This is the September news and product review from Cyberday. Read news about ransomware, new phishing techniques and local NIS2-legistations.

article

20.9.2024

IT and OT Cyber Security: Different Environments, Different Priorities

This blog post outlines the key differences between IT and OT cyber security, focusing on their distinct areas, objectives, environments, threat landscapes, and compliance requirements.

article

4.9.2024

Cyber Security in Supply Chain Risk Management

Businesses should prioritize supply chain security by adopting best cyber security practices, fostering resilience, and promoting collaboration to protect against evolving cyber threats. Learn more about this topic in this blog post.

article

22.8.2024

CISA warns of attacks targeting Internet-connected UPS devices

UPS devices are used as power backups in critical environments. ⚠️ They connect to internet to allow e.g. power monitoring and maintenance. CISA warns of attacks! Disconnect, use VPN & MFA / strong passwords for better #cybersecurity.

Go to article at
1.4.2022

Ukraine dismantles 5 disinformation bot farms, seizes 10,000 SIM cards

Ukrainian Security Service (SSU) raided locations used to host bot farms. 🤖 These fueled 100,000 fake social media accounts spreading false information with the goal of discouraging Ukrainian citizens and instill panic. #cybersecurity

Go to article at
1.4.2022

RCE Bug in Spring Cloud Could Be the Next Log4Shell, Researchers Warn

Spring Cloud is an open-source microservices framework used by millions of developers. An "easy to exploit" #vulnerability found, requiring attacker to only send a malicious string to Java app’s HTTP service. Best defence is a quick patch

Go to article at
1.4.2022

"It's coming": President Biden warns of "evolving" Russian cyber threat to U.S.

🔐 "Lock your digital doors" U.S. officials have spotted 'preparatory work' for Russian #cybercrime, to retaliate against sanctions. They warn of increasing vulnerability hunting especially towards companies in critical infrastructure.

Go to article at
25.3.2022

Anonymous hacks unsecured printers to send anti-war messages across Russia

🖨️ Anonymous hacked 160 misconfigured printers and printed out 40000+ copies of anti-war messages for Russian people. Copies also explained how users can bypass censorship w/ Tor browser (as many media sites are blocked). #cybersecurity

Go to article at
25.3.2022

Ransomware Attack Led Bridgestone to Halt US Tire Production for a Week

⚠️ Bridgestone Americas suffered a #ransomware attack on Feb. 27. This lead the company to shut down its internal network and production in its manufacturing facilities in North and Middle America for 7 days.

Go to article at
25.3.2022

Browser-in-the-Browser Attack Makes Phishing Nearly Invisible

BitB is a novel method that uses third-party SSO options (FB, Google, etc.) on websites for #phishing purposes. These fake login popups can appear very realistic, although they're not. Enabling MFA everywhere is a must to keeping safe.

Go to article at
25.3.2022

Serious Security: DEADBOLT – the ransomware that goes straight for your backups

This novel #ransomware's "niche" are serious home users who take backups. By exploiting a vulnerability in QNAP products, it doesn't need a foothold on your device to to directly encrypt your backup files - asking $1250 to get them back.

Go to article at
25.3.2022

NASA in 'serious jeopardy' due to big black hole in security

🏢 Insider threats are #cybersecurity risks originating from targeted organization itself, due to careless employees, malicious insiders or moles. Even NASA's auditors highlight these threats in their audit report. Learn more >>

Go to article at
18.3.2022