Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

NIS2 Overview: History, key contents and significance for top management

Get an overview of NIS2's main contents and understand how it makes top management clearly responsible for organization's information security efforts.

article

16.2.2024

Best Practices and Common Challenges of ISMS Implementation

No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.

article

14.2.2024

ISMS Guide: Top 10 ISMS Implementation Benefits

What is an ISMS and why does your organization benefit from its implementation in the long run? This blog post will give you a short guide about all the basics you need to know about an ISMS and its top 10 benefits.

article

9.2.2024

Intro to Incident Management: Definitions, benefits and best practices

Learn how an incident management process improves communication, documentation, and continuous improvement for IT organisations.

article

6.2.2024

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

This article provides an insight into the main responsibilities of a CISO, from implementing security principles to fostering collaboration. It also presents valuable tips for successful performance, emphasizing constant learning as a key ingredient.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

Google shuts down malicious ad posing as Brave browser but delivering malware

Scam targeting Brawe browser downloaders: ⚡ Download page a copy at bravė.com (looks identical on address bar) 💸 Ads directing to malicious site 🦠 A stealer malware distributed along the browser #cybersecurity

Go to article at
4.8.2021

Vishing: What is it and how do I avoid getting scammed?

#Vishing is phishing via phone. Tactics used: 📲 Caller ID spoofing (e.g. location hiding, numeron varastaminen) 📧 Multi-channel scams, SMS / email before the call 👤 Scraping details from social media profiles #cybersecurity

Go to article at
18.6.2021

What is the real cost of ransomware?

Worrying #ransomware statistics: ☠️ 80% of those who paid the ransom were soon the target of another attack 📉 66% reported a clear drop in sales after the attack 🙅 29% of incidents led to employee layoffs #cybersecurity

Go to article at
18.6.2021

Microsoft: Scammers bypass Office 365 MFA in BEC attacks

📧 BEC attack phases: 1. Trick user to fill password in a login form mimicking the real one 2. Circumvent MFA utilizing legacy auth protocols (IMAP/POP3) 3. Use forwarding rules to get important emails to the attacker #cybersecurity

Go to article at
18.6.2021

REvil ransomware hits US nuclear weapons subcontractor

Last week REvil #ransomware gang listed companies whose stoled data they're selling for the highest bidder. List includes a nuclear weapons 🚀 subcontractor Sol Oriens. The company has also admitted suffering a #cybersecurity incident.

Go to article at
18.6.2021

One in Five Manufacturing Firms Targeted by Cyberattacks

🏭 Manufacturing #cybersecurity findings: ⚠️ 1 out of 5 companies have suffered a successful cyber attack ⚠️ 61% of smart factories have suffered a cyber incident ⚠️ 66% of staff say increased remote work has increased risks

Go to article at
18.6.2021

54% of all employees reuse passwords across multiple work accounts

Remote work security findings: ⚠️ 32% of C-level executives write passwords down ⚠️ 42% user work devices for personal use ⚠️ 43% say #cybersecurity isn’t their responsibility ⚠️ 40% who clicked a suspicious link wouldn’t tell IT

Go to article at
10.6.2021

Nearly Two Percent of Top-Grossing Apps on App Store Found Siphoning Off $48 Million From Users

Paid QR code readers, malicious VPN apps, apps w/ faked store reviews and apps fraudulently presenting to be from major brands. These apps have bilked an estimated $48 million from users during their time on the App Store. #cybersecurity

Go to article at
10.6.2021

Ransomware-skewered meat producer JBS confesses to paying $11m for its freedom

Last week there was plenty of coverage for the JBS ransomware case. Now company revealed it handed over 💸 $11 million to resolve a ransomware infection that disrupted operations in Australia, the USA, and Canada. #cybersecurity

Go to article at
10.6.2021