Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

This article provides an insight into the main responsibilities of a CISO, from implementing security principles to fostering collaboration. It also presents valuable tips for successful performance, emphasizing constant learning as a key ingredient.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

article

15.12.2023

NIS2: Working towards compliance with Cyberday (3/3)

✈️ You want to lift your cyber security management to a new level & get NIS2 compliant with a smart tool like Cyberday? In this post you'll learn how your organization can achieve NIS2 compliance in a smart way by building an own agile ISMS.

article

23.8.2023

NIS2: Who's in the scope and what security measures are required? (part 2/3)

In this post you'll learn about what industries are affected by NIS2, security requirements the directive sets, and the available enforcement methods if an organization is not compliant.

article

23.8.2023

NIS2: Get familiar with the EU's new cyber security directive (part 1/3)

Learn about the background and reasons behind the EU's new Network and Information Security 2 (NIS2) Directive. How does it affect your company and how should you react to be compliant?

article

1.8.2023

FBI arrests social engineer who allegedly stole unpublished manuscripts from authors

⚠️ A cautionary tale During 5y period, this malicious insider was able to create fake email accounts and impersonate publishing industry people, to steal prepublication manuscripts from famous authors - for own benefit. #cybersecurity

Go to article at
14.1.2022

Kriittinen haavoittuvuus Windowsin http.sys-protokollapinossa

⚠️ Microsoft again released numerous vulnerability fixes on "Patch Tuesday". Of these, the http.sys vulnerability CVE-2022-21907 stands out for its criticality. Perform a corrective software update as soon as possible. #cybersecurity

Go to article at
14.1.2022

Morgan Stanley to pay $60 mln to resolve data security lawsuit

MS.N will pay $60 M to settle a lawsuit by customers who said bank exposed their personal data. In 2016 and 2019 the company twice failed in properly disposing data sensitive equipment, which led to unauthorized access. #cybersecurity

Go to article at
6.1.2022

6 Ways to Minimize Ransomware Damage

1️⃣ Eliminate unnecessary and classify necessary data 2️⃣ Pay attention to email risks and training 3️⃣ Ensure backup processes are in place and tested 4️⃣ Include #ransomware on your disaster recovery plans More tips on the article >>

Go to article at
5.1.2022

Hackers Target Real Estate Websites with Skimmer in Latest Supply Chain Attack

Skimmer attacks (aka formjacking) = inserting malicious code into target website to steal personal data (e.g. credit card details). Now Sotheby's Brightcove account was breached and the video player embed script tampered. #cybersecurity

Go to article at
5.1.2022

Don't copy-paste commands from webpages — you can get hacked

A technologist shows a simple trick, that demonstrates why you should never copy-paste commands directly into your terminal. Trick lies in the JS code hidden behind the PoC HTML page setup. You might not get what you see. #cybersecurity

Go to article at
5.1.2022

Software flaws in walk-through metal detectors made them hackable

⚠️ 9 vulnerabilities in the iC module of walk-through metal detectors, used e.g. in schools, airports and gov buildings. Attacker could exploit these to e.g. change detector sensitivity or otherwise modify its data. #cybersecurity

Go to article at
5.1.2022

5 warning signs your identity has been stolen

After a data breach, the stolen data is often sold on dark web forums to identity fraudsters. Spot these warning signs: ⚠️ Unusual bank card activity ⚠️ Your online accounts stop working ⚠️ Bills for services you never received #cybersecurity

Go to article at
17.12.2021

Inside Ireland’s Public Healthcare Ransomware Scare

Unusually direct and instructive "lessons learned" about #ransomware attack in May 2021. Key points: ⚠️ Initial intrusion 8w earlier, email w/ infected Excel doc ⚠️ IT admins not able to spot "red flags" ⚠️ Recovery costs over 529 M€

Go to article at
17.12.2021