Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Corporate Security Alert: Identifying Dangerous Apps on Employee Phones

This article uncovers hidden security risks of popular apps on work devices, covering social media, messaging, cloud storage, gaming, utility, health, VPN, and shopping apps, with recommendations to safeguard corporate data.

article

20.9.2024

NIS2 national legistation, ransomware and a new development forum: Cyberday product and news round-up 9/2024 🛡️

This is the September news and product review from Cyberday. Read news about ransomware, new phishing techniques and local NIS2-legistations.

article

20.9.2024

IT and OT Cyber Security: Different Environments, Different Priorities

This blog post outlines the key differences between IT and OT cyber security, focusing on their distinct areas, objectives, environments, threat landscapes, and compliance requirements.

article

4.9.2024

Cyber Security in Supply Chain Risk Management

Businesses should prioritize supply chain security by adopting best cyber security practices, fostering resilience, and promoting collaboration to protect against evolving cyber threats. Learn more about this topic in this blog post.

article

22.8.2024

Spreadsheet vs. ISMS tool - top 10 reasons why a tool is better than the traditional way

Discover the top 10 reasons why agile tools outperform traditional spreadsheets in managing cyber security compliance, from centralized management to continuous improvement.

article

22.8.2024

ISMS Essentials: Mastering a Data System Inventory for Your Organization

This post provides essential insights for maintaining a data system inventory within your organization's ISMS, detailing key processes, asset types, and tackling common challenges.

article

15.8.2024

Incident Detection: Building, Nurturing, and Continuously Improving a Proactive Environment

Shift from reactive to proactive incident detection. Use advanced tools, continuous learning, and customised strategies to anticipate and prevent issues. Focus on constant improvement and innovation to boost security and resilience.

article

15.8.2024

ISO 27001 and ISO 9001: Differences, how they work together and benefits of combining

Learn about the synergy between ISO 27001 and ISO 9001. Learn how integrating these standards enhances information security, quality management, and overall operational efficiency, using case examples and actionable insights.

article

6.6.2024

New Hertzbleed Side Channel Attack Affects All Modern AMD and Intel CPUs

⚠️ New interesting #vulnerability in modern Intel/AMD processors can let attackers steal e.g. encryption keys via timing-based side channels. Intel recommends cryptographic devs to harden apps against frequency throttling info disclosure.

Go to article at
17.6.2022

Facebook Messenger Scam Duped Millions

🎣 One #phishing scam stole 1M FB credentials in 4 months - and counting. Scam included familiar elements: 🔗 short msg with a link ↩️ chain of redirects to dodge security 🔐 fake FB login 🤖 automated distribution to victim's friends

Go to article at
17.6.2022

Ransomware Group Debuts Searchable Victim Data

#Ransomware groups have started regularly threatening to publish stolen victim data on dark web. ⚠️ Latest cunning innovation to get victims concerned is publishing on public internet, with all data available in an easily searchable form.

Go to article at
17.6.2022

Paying Ransomware Paints Bigger Bullseye on Target’s Back

#Ransomware deals often go wrong: ⚠️ 80% of victims that paid were hit a 2nd time ⚠️ Frequently data became unusable during the decryption because of corruption issues Remember - attackers will often try to profit in any possible way.

Go to article at
10.6.2022

Cybersecurity awareness training: What is it and what works best?

82% of breaches in 2021 involved a “human element.” Bad actors exploit credulous or careless employees. Trends that grow the need for employee #cybersecurity skills: 🔓 Poor password practices 🦹 Cybercrime growth 📲 Hybrid work

Go to article at
10.6.2022

Know your enemy! Learn how cybercrime adversaries get in…

Researchers dug into reports of 144 real-life #cyberattack's. ⚠️ Unpatched vulnerabilties entry point for 50% of attacks ⌛ Attackers around for more than a month on avg 🖥️ RDP abused to spread the attack by more than 80% of attackers

Go to article at
10.6.2022

Apple's New Feature Will Install Security Updates Automatically Without Full OS Update

Apple: "macOS security gets even stronger with new tools that make the Mac more resistant to attack, including Rapid Security Response that works in between normal updates to easily keep security up to date without a reboot" #cybersecurity

Go to article at
10.6.2022

Costa Rica May Be Pawn in Conti Ransomware Group’s Bid to Rebrand, Evade Sanctions

Costa Rican terveysministeriössä tulostimet menivät sekaisin tänä aamuna Hive #ransomware'ryhmän hyökkäyksen jälkeen. Kaikki järjestelmät ovat toistaiseksi alhaalla. HIVE ei ole julkaissut lunnasvaatimusta. Hyökkäykset voivat jatkua.

Go to article at
3.6.2022

Costa Rica May Be Pawn in Conti Ransomware Group’s Bid to Rebrand, Evade Sanctions

Printers at the Costa Rican government health ministry went crazy this morning after the Hive #ransomware group attacked. All systems went down until further notice. HIVE has not released their ransom fee. Attacks are expected to follow.

Go to article at
3.6.2022