Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Best Practices and Common Challenges of ISMS Implementation

No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.

article

14.2.2024

ISMS Guide: Top 10 ISMS Implementation Benefits

What is an ISMS and why does your organization benefit from its implementation in the long run? This blog post will give you a short guide about all the basics you need to know about an ISMS and its top 10 benefits.

article

9.2.2024

Intro to Incident Management: Definitions, benefits and best practices

Learn how an incident management process improves communication, documentation, and continuous improvement for IT organisations.

article

6.2.2024

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

This article provides an insight into the main responsibilities of a CISO, from implementing security principles to fostering collaboration. It also presents valuable tips for successful performance, emphasizing constant learning as a key ingredient.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

article

15.12.2023

$150 Million Fine to Twitter Over Privacy Violations; Email and Phone for “Account Security” Used in Targeted Advertising Without User Knowledge

FTC is actively regulating privacy in the US. FTC can penalize for e.g. when a social network misleads its users about how personal data will be used or protected. This is what now happened to Twitter, resulting in a 150M$ #privacy fine.

Go to article at
3.6.2022

How to support women in cybersecurity

There are millions of unfilled #cybersecurity job openings around the globe. In the industry women make up roughly 24% of jobs, according to (ISC)². Untapped talent could mean e.g. less innovation. Reasoned thougths on women in cyber >>

Go to article at
3.6.2022

FBI seizes domains used to sell stolen data, DDoS services

FBI seizes harmful domains ⚠️ WeLeakInfo.to sold subscriptions for searching data from 10k data breaches, eg emails, phones, and passwords for online accounts. ⛔ ipstress.in and ovh-booter.com used for DDoS ordering #cybersecurity

Go to article at
3.6.2022

New Microsoft Zero-Day Attack Underway

MS Support Diagnostic Tool has a #vulnerability, that enables running commands remotely via using malicious MS Word documents. No patch available yet, limit by: ☑️ Turning off MSDT URL protocol ☑️ Disabling preview feature in IE

Go to article at
3.6.2022

How Dangerous Is the Cyber Attack Risk to Transportation?

⚠️ +186% increase between 6/2020 - 6/2021 in #ransomware attacks at transportation industry. 🚆 Cyber attacks targeting transport authorities e.g. managing train or subway routes could be terrible. Article lists needed best practices >>

Go to article at
20.5.2022

Over 200 Apps on Play Store Caught Spying on Android Users Using Facestealer

⚠️ Potentially harmful apps persist on Google Play for avg. 77 days Now researchers found 200 Android apps distributing #malware called Facestealer. These apps masquerade as VPNs, fitness, photo editing, and puzzle apps.

Go to article at
20.5.2022

Hackers can steal your Tesla Model 3, Y using new Bluetooth attack

Researchers developed a tool for Bluetooth Low Energy relay attacks. Tesla Model 3 & Y use a BLE-based entry system, so attack could unlock and start the cars. More security? At least there's ‘PIN to Drive’ feature. 🚘 #cybersecurity

Go to article at
20.5.2022

When Your Smart ID Card Reader Comes With Malware

A common security control is using smart ID cards for allowing physical access to buildings or systems. ⚠️ But employers don't always issue approved card readers, so people turn to low-cost online options. Case example >> #cybersecurity

Go to article at
20.5.2022

Some top 100,000 websites collect everything you type—before you hit submit

📨 Subscribing for newsletter, 🏨 booking a hotel, 💸 buying stuff online? New study shows some top websites collect some or all of this data before you hit 'Submit'. This behavior is similar to #malware called keyloggers. #privacy

Go to article at
20.5.2022