Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Corporate Security Alert: Identifying Dangerous Apps on Employee Phones

This article uncovers hidden security risks of popular apps on work devices, covering social media, messaging, cloud storage, gaming, utility, health, VPN, and shopping apps, with recommendations to safeguard corporate data.

article

20.9.2024

NIS2 national legistation, ransomware and a new development forum: Cyberday product and news round-up 9/2024 🛡️

This is the September news and product review from Cyberday. Read news about ransomware, new phishing techniques and local NIS2-legistations.

article

20.9.2024

IT and OT Cyber Security: Different Environments, Different Priorities

This blog post outlines the key differences between IT and OT cyber security, focusing on their distinct areas, objectives, environments, threat landscapes, and compliance requirements.

article

4.9.2024

Cyber Security in Supply Chain Risk Management

Businesses should prioritize supply chain security by adopting best cyber security practices, fostering resilience, and promoting collaboration to protect against evolving cyber threats. Learn more about this topic in this blog post.

article

22.8.2024

Spreadsheet vs. ISMS tool - top 10 reasons why a tool is better than the traditional way

Discover the top 10 reasons why agile tools outperform traditional spreadsheets in managing cyber security compliance, from centralized management to continuous improvement.

article

22.8.2024

ISMS Essentials: Mastering a Data System Inventory for Your Organization

This post provides essential insights for maintaining a data system inventory within your organization's ISMS, detailing key processes, asset types, and tackling common challenges.

article

15.8.2024

Incident Detection: Building, Nurturing, and Continuously Improving a Proactive Environment

Shift from reactive to proactive incident detection. Use advanced tools, continuous learning, and customised strategies to anticipate and prevent issues. Focus on constant improvement and innovation to boost security and resilience.

article

15.8.2024

ISO 27001 and ISO 9001: Differences, how they work together and benefits of combining

Learn about the synergy between ISO 27001 and ISO 9001. Learn how integrating these standards enhances information security, quality management, and overall operational efficiency, using case examples and actionable insights.

article

6.6.2024

Surge in QR Code Quishing: Check Point Records 587% Attack Spike

Users are tricked into downloading malware or accessing malicious websites after scanning QR code. Scanning a QR code can lead user to any website without alerting about suspicious activity⚠️ #phishing #malware

Go to article at
8.11.2023

Infosec pros can secure IT, but have harder time securing job satisfaction

Potential threats for job satisfaction appear to be departmental cutbacks, threat of layoffs, lack of managerial support and heavier workload than years before👨‍💻 #cybersecurity

Go to article at
8.11.2023

How Do We Truly Make Security 'Everyone's Responsibility'?

You can enforce security expectations, clarify expectations and make the security task personal, like giving a own laptop with patching responsibilities, which will likely remind them that it is their working device🔑 #cybersecurity

Go to article at
8.11.2023

Watch Out: Attackers Are Hiding Malware in 'Browser Updates'

Threat actors can turn #cybersecurity best practices against us. ⚠️ When visiting a legitimate website, malicious JS can trigger a real-looking browser update - which actually delivers malware. Be wary of how "updates" get presented.

Go to article at
20.10.2023

Over 40,000 admin portal accounts use 'admin' as a password

#Cybersecurity researchers investigated admin passwords stolen by an infostealer. 🔓 1.8M admin credentials analyzed ➡️ 40,000+ were 'admin' Principles for strong passwords should be one of most fundamental defences for enterprise data.

Go to article at
20.10.2023

Hacker Leaks Millions More 23AndMe User Records On Cybercrime Forum

23andMe, a genetic testing company, suffered a breach 2 weeks ago. Attackers used credential stuffing (using previously leaked credentials to access). ☢️ Now a huge, sensitive dataset w/ 4M users, has been published on #cybercrime forum.

Go to article at
20.10.2023

Better safe than sorry: 10 tips to build an effective business backup strategy

1️⃣ Know what needs backing up and how often 2️⃣ Encrypt your backups 3️⃣ Test regularly Other backup tips, to protect e.g. against accidents or #ransomware attacks, in the article >> #cybersecurity

Go to article at
20.10.2023

Critical, Unpatched Cisco Zero-Day Bug Is Under Active Exploit

☢️ Maximum severity flaw with no patch or workaround currently available. Allows an attacker to gain admin privileges on affected devices." Cisco: Disable the 'HTTPS Server feature' on Internet-facing IOS XE device. #vulnerability

Go to article at
20.10.2023

Safe, Secure, Anonymous, and Other Misleading Claims

"Confidential! Anonymous! 100% secure!" 🚫 These recently hacked 3 companies all communicated about strong #cybersecurity. Reality was very different. Read Troy Hunt's thoughs about "words on a webpage" as security assurance.

Go to article at
6.10.2023