Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

article

15.12.2023

How do you benefit from ISO 27001 certification?

Why do organizations choose to go for ISO 27001 certification? In this blog article, we will give you our top 5 reasons to get certified. Certification will certainly benefit your security directly, but there are other kind of benefits available too.

article

25.10.2023

Working towards NIS2 compliance with Cyberday

✈️ You want to lift your cyber security management to a new level & get NIS2 compliant with a smart tool like Cyberday? In this post you'll learn how your organization can achieve NIS2 compliance in a smart way by building an own agile ISMS.

article

23.8.2023

Who does NIS2 apply to? Scope and required security measures explained.

In this post you'll learn about what industries are affected by NIS2, security requirements the directive sets, and the available enforcement methods if an organization is not compliant.

article

23.8.2023

What is NIS2 directive? Know EU's new cyber security legislation

Learn what is the new EU NIS2 directive, why the original NIS was not enough and how it affects your company's compliance requirements.

article

1.8.2023

SOC 2: Working towards compliance

With the help of SOC 2, organisations can provide proof of effectively implemented controls and the use of best practices to protect the data to their customers and stakeholders, which may help to build trust.

article

31.7.2023

Personnel information security training and guidelines in Cyberday

Most data breaches start with human error. Still, investments in technical information security are often made more eagerly. We tell you why staff information security training and guidelines are important and how to implement then efficiently.

article

13.6.2023

Information security risk management in Cyberday: Identifying risks, evaluation, treatment and closure

Every cyber security framework highlights risk management in its own way. We summarize in this post, what's essential in information security risk management and what kind of an approach Cyberday offers for it.

article

13.6.2023

Ransomware crisis deepens as attacks and payouts rise

🗺️ Businesses without robust backups are more than twice as likely to surrender to ransom demands during an attack. Article emphasizes the need for a multi-layered security strategy beyond just backups. #ransomware

Go to article at
13.12.2024

A macro look at the most pressing cybersecurity risks

📊 Organizations need to implement comprehensive security strategies to protect against evolving cyber threats. Forescout’s 2024 H1 Threat Review highlights a surge in vulnerabilities and an increase in #ransomware. Learn details to stay protected.

Go to article at
13.12.2024

New QR Code Phishing Campaign Exploits Microsoft Sway to Steal Credentials

As #phishing methods evolve, it’s crucial to stay informed and vigilant. These campaigns use sophisticated tactics, including adversary-in-the-middle phishing and QR codes embedded in images or Unicode text, making them difficult to detect.📍

Go to article at
13.12.2024

2 TB of Sensitive “ServiceBridge” Records Exposed in Cloud Misconfiguration

This incident underscores the importance of robust data security measures like encryption, access controls, and regular audits. It's important to learn, how business can prevent similar breaches and protect sensitive information. #vulnerability

Go to article at
13.12.2024

Cyber Resilience Lacking, Organizations Overconfident

✍️ A survey highlights significant gaps in cyber resilience, despite high confidence in organizational strategies. While 98% aim to recover within 24 h after a #cyberattack, only 2% can actually achieve this. 🛡️

Go to article at
13.12.2024

Critical Thinking AI in Cybersecurity: A Stretch or a Possibility?

🧠 AI is still focused on automating tasks in #cybersecurity, leaving decision-making to humans. However, with hackers using AI to create more sophisticated attacks, the industry must elevate AI, aiming for critical thinking capabilities.🤖

Go to article at
13.12.2024

Google Fixes High-Severity Chrome Flaw Actively Exploited in the Wild

Google has released a security update to fix a high-severity vulnerability in its Chrome browser. The bug allows remote attackers to exploit heap corruption via a specially crafted HTML page.🪲 🖥️ #vulnerability

Go to article at
13.12.2024

FBI Shuts Down Dispossessor Ransomware Group's Servers Across U.S., U.K., and Germany

This takedown reflects the global law enforcement effort to combat ransomware, though attackers continue to innovate, particularly by exploiting trusted relationships with contractors and service providers. 🚨 #ransomware

Go to article at
13.12.2024

Why scammers want your phone number

Phone numbers are central to various scams, including #phishing, smishing, SIM swaps, and call forwarding, which can lead to significant financial and data breaches. 📞⛔️

Go to article at
13.12.2024