Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

NIS2 Overview: History, key contents and significance for top management

Get an overview of NIS2's main contents and understand how it makes top management clearly responsible for organization's information security efforts.

article

16.2.2024

Best Practices and Common Challenges of ISMS Implementation

No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.

article

14.2.2024

ISMS Guide: Top 10 ISMS Implementation Benefits

What is an ISMS and why does your organization benefit from its implementation in the long run? This blog post will give you a short guide about all the basics you need to know about an ISMS and its top 10 benefits.

article

9.2.2024

Intro to Incident Management: Definitions, benefits and best practices

Strong incident management process minimizes disruptions. Learn how to build a process that keeps your org running during critical events.

article

6.2.2024

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

Explore the top 10 responsibilities of a CISO and get best practices for success, covering risk management, collaboration, compliance, and continuous learning.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

Threat Trends: Vulnerabilities

📈 We have another record year in CVE disclosure, already 18000+ disclosed. Still most CVEs never get exploited. How should you prioritize #vulnerability's for treatment? Which are severe, which just get media attention? Article has tips ->

Go to article at
30.9.2022

IT admin admits sabotaging ex-employer’s network in bid for higher salary

⚠️ In a bid to get re-hired w/ a larger salary, ex IT employee admitted to sabotage. Mr Umetsu used his old (!) creds to edit DNS records to misdirect web and email traffic. Now he faces upto 10y in prison. #cybersecurity

Go to article at
30.9.2022

Capital One Phish Showcases Growing Bank-Brand Targeting Trend

Phishers watch the news. 📨 6000 #phishing emails going out daily in a scam targeting identities. Campaign exploits Capital One's new partnership with Authentify, tricking bank's customers into uploading images of ID cards.

Go to article at
30.9.2022

Critical WhatsApp Bugs Could Have Let Attackers Hack Devices Remotely

💊 WhatsApp patches two severe flaws that could lead to RCE attacks. One of them (CVE-2022-36934, CVSS score: 9.8) is an integer overflow #vulnerability that can be exploited through establishing a video call.

Go to article at
30.9.2022

Can your iPhone be hacked? What to know about iOS security

Device's #cybersecurity largely depends on your usage. Examples of things that can compromise an iPhone: 💣 sideloaded apps 📱 malicious apps from App Store 📅 calendar invite scams 🛠️ configuration profiles installed through phishing

Go to article at
23.9.2022

Spell-Checking in Google Chrome, Microsoft Edge Browsers Leaks Passwords

Researchers found an "unintended interaction" with #cybersecurity worries: 🔓 When Chrome's Enhanced Spellcheck or Edge's MS Editor is enabled on your browser, the passwords you type on websites leak to Google and Microsoft.

Go to article at
23.9.2022

$35 Million Fine For Morgan Stanley After Unencrypted, Unwiped Harddrives Are Auctioned

💸 $35 million penalty for Morgan Stanley SEC’s enforcement division: "Improper disposal of thousands of hard drives since 2016 was an 'extensive failure' to safeguard customers’ data (as required by federal regulations)". #cybersecurity

Go to article at
23.9.2022

Malwarebytes blocks Google, YouTube as malware

An amusing #malware protection blunder: 📣 "Malwarebytes is aware of a temporary issue with the web filtering component of our product that may be blocking certain domains, including google.com"

Go to article at
23.9.2022

US government software suppliers must attest their solutions are secure

US gov agencies need to start gathering more evidence from software suppliers: ✅ self-attestation needed from suppliers before using the software ❌ if NIST requirements not followed, more explanation / assessments needed #cybersecurity

Go to article at
16.9.2022