Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Best Practices and Common Challenges of ISMS Implementation

No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.

article

14.2.2024

ISMS Guide: Top 10 ISMS Implementation Benefits

What is an ISMS and why does your organization benefit from its implementation in the long run? This blog post will give you a short guide about all the basics you need to know about an ISMS and its top 10 benefits.

article

9.2.2024

Intro to Incident Management: Definitions, benefits and best practices

Learn how an incident management process improves communication, documentation, and continuous improvement for IT organisations.

article

6.2.2024

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

This article provides an insight into the main responsibilities of a CISO, from implementing security principles to fostering collaboration. It also presents valuable tips for successful performance, emphasizing constant learning as a key ingredient.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

article

15.12.2023

8 strange ways employees can (accidently) expose data

Article has interesting "warning examples" for sensitive data exposure, incl.: 📣 LinkedIn career updates 🖨️ discarded office printers 🖼️ social media pics 📧 emails sent to personal accounts 👓 even eyeglass reflections #cybersecurity

Go to article at
7.10.2022

Steam Gaming Phish Showcases Browser-in-Browser Threat

⚠️ Browser-in-the-browser is a novel #phishing tactic that should be on security radars. An authentic-looking fake browser window (e.g. a login form) is deployed to steal credentials and take over accounts. Steam users are now targeted >>

Go to article at
7.10.2022

Former Uber CSO convicted for covering up massive 2016 data theft

Former Uber CSO and DoJ #cybercrime prosecutor guilty of hiding Uber data theft. In 2016 crooks stole 57M customer records from Uber systems. Crooks were paid a ransom to cover up the incident, though law requires disclosing breaches.

Go to article at
7.10.2022

Lazarus hackers abuse Dell driver bug using new FudModule rootkit

☢️ North Korean hacking group spotted exploiting Dell driver CVE in its spear #phishing attacks. Attack disguises as a "job offer" to spy and steal data from carefully selected targets (e.g. aerospace experts, political journalists).

Go to article at
7.10.2022

Threat Trends: Vulnerabilities

📈 We have another record year in CVE disclosure, already 18000+ disclosed. Still most CVEs never get exploited. How should you prioritize #vulnerability's for treatment? Which are severe, which just get media attention? Article has tips ->

Go to article at
30.9.2022

IT admin admits sabotaging ex-employer’s network in bid for higher salary

⚠️ In a bid to get re-hired w/ a larger salary, ex IT employee admitted to sabotage. Mr Umetsu used his old (!) creds to edit DNS records to misdirect web and email traffic. Now he faces upto 10y in prison. #cybersecurity

Go to article at
30.9.2022

Capital One Phish Showcases Growing Bank-Brand Targeting Trend

Phishers watch the news. 📨 6000 #phishing emails going out daily in a scam targeting identities. Campaign exploits Capital One's new partnership with Authentify, tricking bank's customers into uploading images of ID cards.

Go to article at
30.9.2022

Critical WhatsApp Bugs Could Have Let Attackers Hack Devices Remotely

💊 WhatsApp patches two severe flaws that could lead to RCE attacks. One of them (CVE-2022-36934, CVSS score: 9.8) is an integer overflow #vulnerability that can be exploited through establishing a video call.

Go to article at
30.9.2022

Can your iPhone be hacked? What to know about iOS security

Device's #cybersecurity largely depends on your usage. Examples of things that can compromise an iPhone: 💣 sideloaded apps 📱 malicious apps from App Store 📅 calendar invite scams 🛠️ configuration profiles installed through phishing

Go to article at
23.9.2022