Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Framework recap, US security & and role management: Cyberday product and news summary 3/2025 🛡️

The March product and news update presents updates to role management and the new Trust Center, a review of the key frameworks for 2025 and US security.

article

28.3.2025

Understanding DORA compliance: Key steps to prepare your organization

Understand DORA compliance and get a clear DORA requirements summary with key compliance areas, practical steps, and essential guidelines to strengthen your organization's digital resilience.

article

18.3.2025

ISMS implementation: comparison of documents, wikis, ISMS tools and GRC

There are a few different approaches to building an ISMS. In this post, we’ll compare these different methods, helping you understand which might be the best fit for your organization’s security management needs.

article

6.3.2025

What is Statement of Applicability (SoA) in ISO 27001?

In this blog, we'll cover the main purpose and benefits of a well-working Statement of Applicability document. We'll also explain why SoA is important, and 4 key roles it can play in information security work.

article

4.3.2025

Why is ISO 27001 compliance now more important than ever?

Year after year, ISO 27001 standard has remained one of the gold standards for information security. The global standard has remained relevant, but where did ISO 27001 originate? And why is it's popularity just going up?

article

27.2.2025

10 most common non-conformities in ISO 27001 audits

Audits and non-conformities drive organizations toward continuous improvement. But before your first ISO 27001 certification, it's good to be aware of some most common non-conformities, so you can avoid these in your certification audit.

article

18.2.2025

Got an ISO 27001 audit interview request - what should I expect?

In this blog, we will talk about the importance of employee participation in the audit interview process, why auditors value employee insights, and look into possible questions asked in an ISO 27001 interview.

article

13.2.2025

ISO 27001 compliance and certification checklist

Looking to ensure you fill ISO 27001 requirements? This checklist will present clearly ordered key steps that guide your organization in building an ISMS and getting compliant with the ISO 27001 standard.

article

6.2.2025

Why more transparency around cyber attacks is a good thing for everyone

NCSC: Particularly #ransomware attacks going unreported is a big concern Some related myths that are NOT TRUE: ❌ If there's no evidence of data theft, you don't need to report ❌ If you've got good offline backups, you're OK

Go to article at
12.5.2023

Turning on stealth mode: 5 simple strategies for staying under the radar online

Want to be safe and private online? These can help you: 📨 Disposable email addresses 📱 Cheap prepaid SIMs 💳 Single-use, virtual bank cards More tips in the article >> #privacy

Go to article at
12.5.2023

Hackers Are Using ChatGPT-Themed Lures to Spread Sophisticated Malware on Meta

⚠️ Meta: Hackers exploiting interest in AI chatbots to trick people into installing #malware and take over accounts This is a common trend, bad actors exploiting high-engagement topics for their benefit. Details >>

Go to article at
12.5.2023

San Bernardino County Sheriff’s Department paid a $1.1M ransom

👮 #Ransomware forced police to shut down its main systems (e.g. email, in-car computers and law enforcement DBs). 💰 Despite authorities always saying "do not pay", they chose to pay 1.1M$ ransom to recover the encrypted systems and data.

Go to article at
12.5.2023

Security Risks of AI

📃 Stanford and Georgetown published a report with 11 clear recommendations on the #cybersecurity risks of AI. "The understanding of how to secure AI systems lags far behind their widespread adoption." Link to full version >>

Go to article at
28.4.2023

Fake Flipper Zero sellers are after your money

Flipper Zero is a portable multi-tool for pentesters and hardware geeks - often out of stock due to its popularity. ⚠️ Bad actors are noticing this and creating bogus sites claiming to sell Flipper Zero. Case example >> #cybersecurity

Go to article at
28.4.2023

How we fought bad apps and bad actors in 2022

Google's 2022 #cybersecurity numbers - 1.43M policy-violating apps blocked from Google Play - 173K bad accounts banned - $2000M in fraudulent transactions prevented - 500K apps stopped from unnecessarily accessing sensitive permissions

Go to article at
28.4.2023

Google leaking 2FA secrets – researchers advise against new “account sync” feature for now

G Authenticator launched an “account sync” so users can backup 2FA data to cloud and later restore to a new device. ⛔ Researchers though have found some #cybersecurity worries in the feature (especially with encryption). Details >>

Go to article at
28.4.2023

Microsoft: Windows 10 22H2 is the final version of Windows 10

⚠️ The current version (22H2) will be the final version of Windows 10 - work versions supported until May 2025. MS encourages transitioning to Windows 11. 22H2 won't get any Windows 10 feature updates, but #cybersecurity updates continue.

Go to article at
28.4.2023