Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

NIS2 Overview: History, key contents and significance for top management

Get an overview of NIS2's main contents and understand how it makes top management clearly responsible for organization's information security efforts.

article

16.2.2024

Best Practices and Common Challenges of ISMS Implementation

No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.

article

14.2.2024

ISMS Guide: Top 10 ISMS Implementation Benefits

What is an ISMS and why does your organization benefit from its implementation in the long run? This blog post will give you a short guide about all the basics you need to know about an ISMS and its top 10 benefits.

article

9.2.2024

Intro to Incident Management: Definitions, benefits and best practices

Strong incident management process minimizes disruptions. Learn how to build a process that keeps your org running during critical events.

article

6.2.2024

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

Explore the top 10 responsibilities of a CISO and get best practices for success, covering risk management, collaboration, compliance, and continuous learning.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

Cloud Apps Replace Web as Source for Most Malware Downloads

🔺 Google Drive, Microsoft OneDrive and Box are (unsurprisingly) also cyber criminals favourites for #malware hosting. 🔺 On delivery side weaponized MS Office documents count for 37% of all malware downloads (nearly +100% from 2020)

Go to article at
14.1.2022

FBI arrests social engineer who allegedly stole unpublished manuscripts from authors

⚠️ A cautionary tale During 5y period, this malicious insider was able to create fake email accounts and impersonate publishing industry people, to steal prepublication manuscripts from famous authors - for own benefit. #cybersecurity

Go to article at
14.1.2022

Kriittinen haavoittuvuus Windowsin http.sys-protokollapinossa

⚠️ Microsoft again released numerous vulnerability fixes on "Patch Tuesday". Of these, the http.sys vulnerability CVE-2022-21907 stands out for its criticality. Perform a corrective software update as soon as possible. #cybersecurity

Go to article at
14.1.2022

Morgan Stanley to pay $60 mln to resolve data security lawsuit

MS.N will pay $60 M to settle a lawsuit by customers who said bank exposed their personal data. In 2016 and 2019 the company twice failed in properly disposing data sensitive equipment, which led to unauthorized access. #cybersecurity

Go to article at
6.1.2022

6 Ways to Minimize Ransomware Damage

1️⃣ Eliminate unnecessary and classify necessary data 2️⃣ Pay attention to email risks and training 3️⃣ Ensure backup processes are in place and tested 4️⃣ Include #ransomware on your disaster recovery plans More tips on the article >>

Go to article at
5.1.2022

Hackers Target Real Estate Websites with Skimmer in Latest Supply Chain Attack

Skimmer attacks (aka formjacking) = inserting malicious code into target website to steal personal data (e.g. credit card details). Now Sotheby's Brightcove account was breached and the video player embed script tampered. #cybersecurity

Go to article at
5.1.2022

Don't copy-paste commands from webpages — you can get hacked

A technologist shows a simple trick, that demonstrates why you should never copy-paste commands directly into your terminal. Trick lies in the JS code hidden behind the PoC HTML page setup. You might not get what you see. #cybersecurity

Go to article at
5.1.2022

Software flaws in walk-through metal detectors made them hackable

⚠️ 9 vulnerabilities in the iC module of walk-through metal detectors, used e.g. in schools, airports and gov buildings. Attacker could exploit these to e.g. change detector sensitivity or otherwise modify its data. #cybersecurity

Go to article at
5.1.2022

5 warning signs your identity has been stolen

After a data breach, the stolen data is often sold on dark web forums to identity fraudsters. Spot these warning signs: ⚠️ Unusual bank card activity ⚠️ Your online accounts stop working ⚠️ Bills for services you never received #cybersecurity

Go to article at
17.12.2021