Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Cyber security regulations and frameworks in Belgium 🇧🇪

Explore Belgium cyber security regulations and frameworks like NIS2, GDPR, DORA, and ISO 27001 to ensure your business stays compliant and secure.

article

30.4.2025

What is the NIS2 Law in Belgium? 🇧🇪 Introduction to requirements

Learn what the Belgian NIS2 Law is, Belgium’s national implementation of the EU NIS2 Directive. Understand key requirements, compliance timelines, sector coverage, and how Cyberday helps you meet them.

article

29.4.2025

What is CyberFundamentals? 🇧🇪 Belgium's cybersecurity framework

Learn what is CyberFundamentals, Belgium's cybersecurity framework for SMEs. Get an overview of requirements, benefits, and steps for compliance.

article

29.4.2025

10 things I wish I knew: Starting your ISO 27001 project on the right track

This post shares 10 key lessons learned from going through an ISO 27001 certification project - from the importance of setting clear goals and managing documentation to the realities of risk management and the value of using the right tools.

article

23.4.2025

Understanding NIS2: supervision and penalties of non-compliance

Let's now look into the NIS2 directive, it's supervision in EU member states and what is supervised. We'll also check out NIS2 penalties for noncompliance and how you can stay compliant (to avoid penalties).

article

15.4.2025

Comparing EU cybersecurity frameworks: NIS2, GDPR, DORA and more

A comparison of key cybersecurity frameworks in the EU, including NIS2, GDPR, DORA, CRA, and ISO 27001. Learn who they apply to and what they require.

article

10.4.2025

ISO 27001 compliance vs. certification: differences, benefits & which path to choose

Understanding when to pursue ISO 27001 compliance rather than going for certification—or vice versa—hinges on your organizational priorities, resources, and long-term security strategies. Check the differences and learn which path to choose.

article

1.4.2025

Framework recap, US security & and role management: Cyberday product and news summary 3/2025 🛡️

The March product and news update presents updates to role management and the new Trust Center, a review of the key frameworks for 2025 and US security.

article

28.3.2025

Mitsubishi Electric Discloses Information Leak

Electronics manufacturer Mitsubishi waits six months to declare breach

Go to article at
15.5.2020
Illegal Personal Data Processing

Phishing Attack Says You're Exposed to Coronavirus, Spreads Malware

A new phishing campaign has been spotted that pretends to be from a local hospital telling the recipient that they have been exposed to the Coronavirus and that they need to be tested.

Go to article at
15.5.2020
Phishing

COVID-19 Phishing Update: Infected Coworker Email Targets Enterprise O365 Credentials

Threat actors are exploiting employee concerns about infected colleagues. Our latest example targets Office 365 accounts at a large Canadian company by falsely claiming a colleague has died from the virus. 

Go to article at
15.5.2020
Saved For Later,Phishing

How to Use Google Chrome Extensions and Themes in Microsoft Edge

Microsoft's new Edge browser is now available and it comes with an add-on store where you can find Microsoft-approved extensions. As Edge is built on the same Chromium code base, it can also access the Chrome Web Store. [...]

Go to article at
15.5.2020
CyberNow

Ransomware attack freezes health records access at 110 nursing homes

In some cases, nurses can’t update and order drugs. For one assisted-living facility, lack of timely Medicaid billing could force closure.

Go to article at
15.5.2020
Ransomware

Tor Project cut a third of its staff due to the Coronavirus

The Tor Project cut a third of its staff due to the economic impact of the ongoing Coronavirus outbreak, 13 staffers out of 35 left the team. The ongoing Coronavirus outbreak has a significant impact on the Tor Project that was forced to cut a third of its staff due to the economic impact of […] The post Tor Project cut a third of its staff due to the Coronavirus appeared first on Security Affairs.

Go to article at
15.5.2020
CyberNow

Tax rebate scam emails target concerned households during coronavirus crisis

Hackers are exploiting the hardship and concerns faced by households across the country with false emails claiming to offer support in the form of a tax rebate.

Go to article at
15.5.2020
Phishing

Fake Steam skin giveaway site tricks users into sharing their login credentials

The scam is promoted through comments made to Steam profiles. To make it look legitimate, the phishing site contains a fake chat screen running on the left-hand side of the page.

Go to article at
15.5.2020
Phishing

The Top 10 State of Security Blog Posts from 2019

It’s been another fantastic year on The State of Security blog. With over 350 blogs published from all walks of the security community, we like to think of the blog as more of an industry resource that caters to not only experienced security professionals but also to those who are new to the community. To […]… Read MoreThe post The Top 10 State of Security Blog Posts from 2019 appeared first on The State of Security.

Go to article at
15.5.2020
CyberNow