Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Understanding Physical Security in Cybersecurity: Insights from ISO 27001 and Best Practices

Physical security controls are essential, but often undervalued, in safeguarding information systems from unauthorized access, which might otherwise lead to data breaches or business disruptions.

article

22.11.2024

DORA essentials: Introduction, Scope and key requirements

In this blog, we’ll get an comprehensive introduction what DORA is, what it entails, who the requirements framework applies to, and how DORA is implemented within Cyberday. DORA framework is available in Cyberday!

article

14.11.2024

Cyberday goes Cyber Security Nordic 2024!

Our Cyberday team attended the Cyber Security Nordic 2024 event 29th-30th October. Read about the event, keynote and our insights. This post offers insight into topical themes, also for those who were unable to attend.

article

31.10.2024

From Compliance to Collaboration: How NIS2 Encourages Stronger Supply Chain Security Collaboration

Discover how NIS2 shifts focus from simple compliance to creating collaborative security partnerships, enhancing supply chain resilience and trust. 

article

25.10.2024

Agendium Ltd is now Cyberday Inc.!

We are thrilled to announce that our company is entering an exciting new chapter with an updated brand, from Agendium Ltd to Cyberday Inc, our new name better reflects our entity, and the direction we are heading.

article

24.10.2024

10 compliance traps & how to avoid them

Explore crucial cyber security compliance pitfalls for SMEs, from outdated policies to insider threats, and learn effective strategies to mitigate risks and enhance security measures.

article

18.10.2024

ISO 9001 standard: A peek inside the Quality framework

This blog post explores ISO 9001, the globally recognized standard for quality management systems (QMS), benefits for utilizing the standard and its significance in today’s competitive business environment.

article

8.10.2024

Navigating the Cybersecurity Maze: Master NIS2 with the help of ISO 27001

Learn how to master NIS2 with ISO 27001 and grab our free NIS2 e-book! This blog post was originally written for the Cyber Security Nordic 2024 event where Cyderday is presented as Strategic partner.

article

3.10.2024

5 useful search engines for internet‑connected devices and services

Tools for #cybersecurity pros to monitor connected devices: 🤖 Shodan gets detailed device info (IP, OS, used software, open ports) 🦾 Censys adds additional security info (e.g. vulnerabilities, SSL certificates) Continue the list... >>

Go to article at
19.5.2023

KeePass vulnerability allows attackers to access the master password

KeePass is free, open source pw manager. Researcher recently reported a related #vulnerability: ⚠️ "In KeePass 2.x before 2.54, you can recover the cleartext master password from a memory dump, even when workspace is locked / not running."

Go to article at
19.5.2023

4 Countries Join NATO Cyber Defense Center

🌐 NATO #cybersecurity center just turned 15 and announced new members: Ukraine, Ireland, Japan and Iceland. CCDCOE now has 39 members, including some non-NATO countries. Center conducts e.g. large-scale cybersec research and exercices.

Go to article at
19.5.2023

PharMerica breach impacts almost 6 million people

🚩 US pharmacy giant notified 5.8m customers of a breach where personal data was stolen (e.g. medication lists). #Ransomware group "Money Message" claimed responsibility and has published parts of the stolen data on their leak site.

Go to article at
19.5.2023

Why more transparency around cyber attacks is a good thing for everyone

NCSC: Particularly #ransomware attacks going unreported is a big concern Some related myths that are NOT TRUE: ❌ If there's no evidence of data theft, you don't need to report ❌ If you've got good offline backups, you're OK

Go to article at
12.5.2023

Turning on stealth mode: 5 simple strategies for staying under the radar online

Want to be safe and private online? These can help you: 📨 Disposable email addresses 📱 Cheap prepaid SIMs 💳 Single-use, virtual bank cards More tips in the article >> #privacy

Go to article at
12.5.2023

Hackers Are Using ChatGPT-Themed Lures to Spread Sophisticated Malware on Meta

⚠️ Meta: Hackers exploiting interest in AI chatbots to trick people into installing #malware and take over accounts This is a common trend, bad actors exploiting high-engagement topics for their benefit. Details >>

Go to article at
12.5.2023

San Bernardino County Sheriff’s Department paid a $1.1M ransom

👮 #Ransomware forced police to shut down its main systems (e.g. email, in-car computers and law enforcement DBs). 💰 Despite authorities always saying "do not pay", they chose to pay 1.1M$ ransom to recover the encrypted systems and data.

Go to article at
12.5.2023

Security Risks of AI

📃 Stanford and Georgetown published a report with 11 clear recommendations on the #cybersecurity risks of AI. "The understanding of how to secure AI systems lags far behind their widespread adoption." Link to full version >>

Go to article at
28.4.2023