Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Understanding Physical Security in Cybersecurity: Insights from ISO 27001 and Best Practices

Physical security controls are essential, but often undervalued, in safeguarding information systems from unauthorized access, which might otherwise lead to data breaches or business disruptions.

article

22.11.2024

DORA essentials: Introduction, Scope and key requirements

In this blog, we’ll get an comprehensive introduction what DORA is, what it entails, who the requirements framework applies to, and how DORA is implemented within Cyberday. DORA framework is available in Cyberday!

article

14.11.2024

Cyberday goes Cyber Security Nordic 2024!

Our Cyberday team attended the Cyber Security Nordic 2024 event 29th-30th October. Read about the event, keynote and our insights. This post offers insight into topical themes, also for those who were unable to attend.

article

31.10.2024

From Compliance to Collaboration: How NIS2 Encourages Stronger Supply Chain Security Collaboration

Discover how NIS2 shifts focus from simple compliance to creating collaborative security partnerships, enhancing supply chain resilience and trust. 

article

25.10.2024

Agendium Ltd is now Cyberday Inc.!

We are thrilled to announce that our company is entering an exciting new chapter with an updated brand, from Agendium Ltd to Cyberday Inc, our new name better reflects our entity, and the direction we are heading.

article

24.10.2024

10 compliance traps & how to avoid them

Explore crucial cyber security compliance pitfalls for SMEs, from outdated policies to insider threats, and learn effective strategies to mitigate risks and enhance security measures.

article

18.10.2024

ISO 9001 standard: A peek inside the Quality framework

This blog post explores ISO 9001, the globally recognized standard for quality management systems (QMS), benefits for utilizing the standard and its significance in today’s competitive business environment.

article

8.10.2024

Navigating the Cybersecurity Maze: Master NIS2 with the help of ISO 27001

Learn how to master NIS2 with ISO 27001 and grab our free NIS2 e-book! This blog post was originally written for the Cyber Security Nordic 2024 event where Cyderday is presented as Strategic partner.

article

3.10.2024

Hackers Compromise Employee Accounts to Access Twilio Internal Systems

⚠️ Twilio's employees were hit with SMS #phishing messages supposedly from the company’s IT department. Organizations serious about their customers’ data should actively guide employees to spot scams. Article has some tips for this >>

Go to article at
12.8.2022

Slack admits to leaking hashed passwords for five years

Slack notified users of an embarrassing #cybersecurity snafu, as workspace invitations included senders hashed password. 🔐 This article also includes clearly worded info about password hashing, salting and stretching. Valuable read!

Go to article at
12.8.2022

Start as you mean to go on: the top 10 steps to securing your new computer

Protect your PC from #cybersecurity threats: 🔧 Auto-updates for OS, software and browser 🛑 Remove bloatware 💾 Configure backups 🌐 Check browser privacy/security settings 🔏 Use a password manager and MFA Continues on the article >>

Go to article at
5.8.2022

VirusTotal Reveals Most Impersonated Software in Malware Attacks

To create e.g. successful #phishing attacks, cyber criminals are mimicking legitimate businesses and apps. 📱 Most impersonated apps include: Skype Adobe Reader TeamViewer CCleaner MS Edge Zoom WhatsApp

Go to article at
5.8.2022

How IT Teams Can Use 'Harm Reduction' for Better Cybersecurity Outcomes

Harm reduction approach in #cybersecurity guidance: ⛔ "Never use QR codes!" vs. ⚠️ "Well.. if you do use a QR code, at least use these cues to know, if you landed on a secure site or not." Efficient or sloppy?

Go to article at
5.8.2022

FEMA warns emergency alert systems could be hacked to transmit fake messages unless software is updated

⚠️ #Cybersecurity researcher provided FEMA with evidence that unpatched EAS (Emergency Alert System) devices are vulnerable. 📺 TV and radio networks use these to transmit alerts. This could allow hackers to broadcast fake alert messages.

Go to article at
5.8.2022

Microsoft accounts targeted with new MFA-bypassing phishing kit

⚠️ Ongoing large-scale attack uses typo-squatted domains and proxy-based #phishing kit to target MS users and bypass MFA. Goal - breach corporate accounts for BEC attacks and divert payments to attacker's bank accounts. Attack details >>

Go to article at
5.8.2022

Industroyer: A cyber‑weapon that brought down a power grid

Back in 2017, Industroyer was the first #malware targeted for hitting power grids. ⚠️ In 04/22 Rus attacked grids in UKR. Attack was luckily thwarted, but critical infrastructure is becoming more and more frequent target for cyber attacks.

Go to article at
17.6.2022

Travel-related Cybercrime Takes Off as Industry Rebounds

Researchers warn a post-COVID upsurge in travel has painted a bullseye on the industry and has spurred #cybercrime's. Rising: ✈️ Theft of airline reward points 🔐 Account takeover for travel websites 🗄️ Travel-related database breaches

Go to article at
17.6.2022