Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Cyberday Community has been launched!

We just launched a new Community section inside Cyberday. Our goal is to make collaboration with your peers and with us easier and thus help you improve your information security even further!

article

24.3.2023

ISO 27001 standard updated to 2022 version - what changed?

What has changed when comparing 2013 vs. 2022 versions of ISO 27001 and how are these updates visible on Cyberday?‍

article

18.11.2022

Efficient cyber risk management with new autopilot mode

We're constatly searching for ways to automate and create efficient cyber risk management. Our newest additions is risk autopilot mode. It's concept is described on this post.

article

1.6.2022

Infographic: Why is cyber security getting more and more important?

Here's a visual summary of some of the drivers that continue to make cyber security more and more important for all organizations.

article

11.2.2022

Cyberday Teams app is now available!

Our Teams app passed the latest Microsoft tests and is now available from the Teams app store. This article reviews the benefits and deployment of Cyberday's Teams app.

article

1.7.2020

Content update published to Cyberday

We released an update to Cyberday documentation. The goal was to streamline documentation, highlight the most important things and significantly reduce the amount of separately documented items.

article

11.6.2020

Cyberday launched: Frameworks, Teams-integration and much more

Cyberday works now inside a Microsoft Teams and by choosing a framework you can guide your own work. In this blog you'll find a summary from reforms!

article

20.5.2020

Ryuk Ransomware Forces Prosegur Security Firm to Shut Down Network

In a statement at midday today (local time), Spanish multinational security company Prosegur announced that it was the victim of a cybersecurity incident disrupting its telecommunication platform. [...]

Go to article at
15.5.2020
Ransomware

Human Error Linked to 60% of Security Breaches

Gallagher study finds companies exposed to service outages and data loss risks

Go to article at
15.5.2020
Employee Negligence

COVID-19 Testing Center Hit By Cyberattack

Hospitals around the world struggle with ever-growing waves of COVID-19 infections but the efforts in one testing center in Europe are being hampered by cybercriminal activity. [...]

Go to article at
15.5.2020
Ransomware

Why identity theft is "so easy" and what consumers can do to combat the threat

The Identity Theft Resource Center said that the significant new threat to consumer data is as simple as large organizations failing to add a password to protect their cloud-based data.The group estimates about 165 million sensitive records were exposed in 2019 when nearly 15,000 breaches of U.S. private and government organizations were uncovered, a 17% jump from the year before. Their published report mentions noteworthy "credential stuffing" attacks in 2019 included Boost Mobile, Dunkin', and Disney+. Credential stuffing refers to the exploding trend of hackers buying someone's stolen login and password from the dark web, and then using the same combination to access their other online accounts. "The reason it's so easy is because so many of us use the same password for multiple accounts," Identity Theft Resource Center COO James Lee told CBS News' Anna Werner. Werner told "CBS This Morning" that the surest protections are using different password and login combinations for different accounts.

Go to article at
15.5.2020
Phishing

Hackers accessed staff mailboxes at Italian bank Monte dei Paschi

Monte dei Paschi, one of the biggest Italian banks, suffered a cyber attack, hackers accessed the mailboxes of some employees and sent emails to clients. Italian state-owned bank Monte dei Paschi discloses a security breach, hackers have accessed the mailboxes of some employees and sent emails to clients. The news was reported by the Reuters […] The post Hackers accessed staff mailboxes at Italian bank Monte dei Paschi appeared first on Security Affairs.

Go to article at
15.5.2020
Phishing

Researchers disclose DLL loading vulnerabilities in Autodesk, Trend Micro, Kaspersky software

Updated: Privilege escalation and code execution bugs lurked in the applications.

Go to article at
15.5.2020
Unpatched Vulnerabilities

CCPA privacy requests cost business up to $275k per million consumer records

Organizations who plan on manually processing CCPA data subject requests (DSRs) or data subject access requests will spend between $140k – $275k per million consumer records they have in their systems, according to DataGrail. The CCPA went into effect on January 1, 2020, giving consumers the right to know the data collected about them, to delete data about them, and ensure their data is not sold to third-parties. The report analyzed the number of requests … More → The post CCPA privacy requests cost business up to $275k per million consumer records appeared first on Help Net Security.

Go to article at
15.5.2020
Illegal Personal Data Processing

Microsoft Teams goes down as Europe starts working from home

As millions of people across Europe choose to work remotely rather than head into the office in the wake of the Coronavirus pandemic, a widely-used communication and collaboration tool has gone down.

Go to article at
15.5.2020
Denial-of-Service Attacks

Shadow IT accounts with weak passwords endanger organizations

63% of enterprise professionals have created at least one account without their IT department being aware of it, and two-thirds of those have created two or more, the results of a recent 1Password survey have revealed. Even more worryingly, only 2.6% of these 63% use a unique password when they create a new shadow IT account at work and just 13% use a password generator – the rest re-use a memorable password or use a … More → The post Shadow IT accounts with weak passwords endanger organizations appeared first on Help Net Security.

Go to article at
15.5.2020
Outdated Access Rights