Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Framework recap, role of the CISO & and vendor assessments: Cyberday product and news round-up 12/2024 🛡️

December's product and news round-up will showcase the vendor security assessments and new enterprise-level features, an overview of the key frameworks for 2025 and the roles of the CISO and personnel in an organisation's security.

article

19.12.2024

Europe's Compliance Revolution: Evolving Cyber Sec Consulting

The evolving cyber sec landscape and growing demand for compliance in combination with a shortage of professionals calls for new ways of working. With the help of partnerships and agile tools, consultants can benefit from the current situation.

article

18.12.2024

TISAX: Understanding the Automotive framework

By embracing TISAX, automotive industry operators can improve information security, enhance compliance and strengthen their market position. Read more about TISAX, its scope, requirements and how ISO 27001 fits in.

article

3.12.2024

Recognising growth: move to new offices with Cyberday!

Join the Cyberday team when it's time to upgrade to a bigger office space. Read about the highlights of the autumn, and let's reflect together on how growth and physical security can shape the workspace.

article

28.11.2024

Understanding Physical Security in Cybersecurity: Insights from ISO 27001 and Best Practices

Physical security controls are essential, but often undervalued, in safeguarding information systems from unauthorized access, which might otherwise lead to data breaches or business disruptions.

article

22.11.2024

DORA essentials: Introduction, Scope and key requirements

In this blog, we’ll get an comprehensive introduction what DORA is, what it entails, who the requirements framework applies to, and how DORA is implemented within Cyberday. DORA framework is available in Cyberday!

article

14.11.2024

Cyberday goes Cyber Security Nordic 2024!

Our Cyberday team attended the Cyber Security Nordic 2024 event 29th-30th October. Read about the event, keynote and our insights. This post offers insight into topical themes, also for those who were unable to attend.

article

31.10.2024

From Compliance to Collaboration: How NIS2 Encourages Stronger Supply Chain Security Collaboration

Discover how NIS2 shifts focus from simple compliance to creating collaborative security partnerships, enhancing supply chain resilience and trust. 

article

25.10.2024

Hackers slip into Microsoft Teams chats to distribute malware

MS Teams conversations are exploited to distribute malicious files after the 365 credentials have been stolen e.g. through #phishing. Employees may be attentive to email, but vigilance is needed on other channels as well.

Go to article at
18.2.2022

Google announces zero-day in Chrome browser – update now!

Check that you have Chrome 98.0.4758.102 or later. The RCE holes in browsers are dangerous because they can lead to so-called drive-by downloads, where simply visiting a maliciously crafted website can bring #malware to your device.

Go to article at
18.2.2022

NSA Issues Guidance for Selecting Strong Cisco Password Types

NSA issues new guidance on how to use strong password types on Cisco devices. The agency emphasizes that attacks caused by poorly secured network infrastructure are on the rise. #cybersecurity

Go to article at
18.2.2022

Massive cyberattack takes Ukraine military, big bank websites offline

In Ukraine, websites of the Ministry of Defense, other military sites and two major banks crashed in a coordinated DDoS attack. DDoS attacks are often used as a distraction when other intrusion attempts are made or tested. #cybersecurity

Go to article at
18.2.2022

Russia’s offensive cyber actions should be a cause for concern for CISOs

"We’ve been warning for weeks and months about Russian cyber threats to Ukraine and beyond". US national #cybersecurity advisor is hoping to instill a sense of urgency to CISOs everywhere to tighten up their security posture.

Go to article at
18.2.2022

How Phishers Are Slinking Their Links Into LinkedIn

⚠️ LinkedIn has a “redirect” feature for businesses. Criminals are leveraging new / hacked accounts to create their "ad" campaigns utilizing this. Due to this links you receive pointing to LinkedIn.com could forward to #phishing sites.

Go to article at
11.2.2022

Qbot needs only 30 minutes to steal your credentials, emails

Widespread #malware Qbot needs 30min after initial infection to steal browser data and emails from Outlook and 50 minutes before lateral movement to adjacent workstations. ➡️ Full attack timeline available on the article.

Go to article at
11.2.2022

“We absolutely do not care about you”: Sugar ransomware targets individuals

#Ransomware used to target only big corps. Now SMBs & individuals are frequent targets, as attacks get automated. Sugar is RaaS targeting single devices. Features a negotiation chat, "decrypt 5 files free" and an automated ransom amount.

Go to article at
11.2.2022

North Korean Missile Program Funded Through Stolen Crypto

In 1,5 years, hackers have stolen 50M$ of crypto from exchanges in US, EUR and Asia. Some sources say amount can be 400M$. This money is a "key revenue source" to fund Pyongyang's nuclear missile programme, says UN report. #cybersecurity

Go to article at
11.2.2022