Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

What is a vCISO? Understanding the role of virtual CISO

What is a vCISO, what they do, and why the virtual CISO model is growing fast among companies and cybersecurity consultants.

article

12.6.2025

What is a modular cyber security framework and why they are essential for consultants

Modular cyber security frameworks make compliance management easier, and helps consultants scale faster, win more deals, and build recurring revenue.

article

12.6.2025

Cyberday app outage on Tuesday 10/6/2025: Explanation and follow-up

This message goes through the details of the recent incident that produced downtime in Cyberday during 10.6.2025, and related early mitigation.

article

11.6.2025

Kicking Off a Summer of Innovation at Cyberday

This summer, Cyberday is proud to launch an ambitious and inspiring project centered on deep regulatory research and international collaboration. We’ve welcomed 12 talented information security students, who will work together to simplify compliance.

article

10.6.2025

What is CRA? Introduction to Cyber Resilience Act requirements

What is CRA (Cyber Resilience Act)? Learn CRA requirements, who it applies to, and how to prepare for CRA compliance with this complete, practical guide.

article

2.6.2025

NIS2 delays, healthcare breaches & improved Trust Center: Cyberday product and news summary 5/2025 🛡️

This is the May news and product review from Cyberday and also a summary of the latest admin webinar. Read about NIS2 delays, recent cyberattacks as well as recent and future development on Cyberday.

article

30.5.2025

End of hourly billing: why value-based pricing works for compliance consultants

Hourly billing is fading fast in compliance consulting. Learn why value-based pricing better aligns incentives, boosts earnings, and how compliance consultants can transition effectively.

article

26.5.2025

What is an ISMS? A guide to information security management systems

Learn what ISMS is, why it matters, and how to implement an ISMS step-by-step. See how ISO 27001 and NIS2 fit into your information security management system.

article

14.5.2025

LVHN Reports Cyberattack by Russian Ransomware Gang

The #ransomware group behind the attack, called "Black cat", is an example of a gang that advertises their RaaS services on dark web and takes a cut of the final attack profits. ⚠️ Ransomware-as-a-service is becoming more and more common.

Go to article at
24.2.2023

Will ChatGPT start writing killer malware?

ChatGPT is good enough to produce homework answers, legal responses and medical diagnoses that pass the “smell test”. Even now it can e.g. make #phishing more convincing and automate ransomware negotiations. What's next? See article >>

Go to article at
24.2.2023

Phishing Fears Ramp Up on Email, Collaboration Platforms

State of Email Security report: 🎣 97% of companies saw a #phishing attack 💰 66% acknowledged a successful ransomware attack 🏭 Energy (83%) & healthcare (80%) among most breached industries 💬 Slack and Teams growing exploit channels

Go to article at
24.2.2023

Spam and phishing in 2022

📨 2022 #phishing themes: - 49% of emails were spam, 30% of spam originated from Russia - Global events (e.g. World Cup, Ukraine crisis) and bonuses/compensations big scam themes - Scammers’ crypto interest growing

Go to article at
17.2.2023

Camera the Size of a Grain of Salt

📸 Micro-sized cameras have great potential to e.g. identify health risks. New breakthroughs enable tiny cameras w/ crisp images on par with 500,000x larger camera lens. This can also change the nature of surveillance. #cybersecurity

Go to article at
17.2.2023

Mapping your supply chain

🌐 Supply chain mapping creates an up-to-date view of your supplier network. It will help to e.g.: - improve contractual #cybersecurity measures - identify suppliers needed to restore from incidents - improve compliance More tips >>

Go to article at
17.2.2023

Data Breach on Instant Checkmate and Truthfinder Background Check Services Leaked 20 Million Records

PeopleConnect scrapes personal data from e.g. court records, marriage/criminal registries and social media. On Jan 21, a hacker published a treasure trove reportedly obtained from them - 2.9 GB CSV with 20M+ records. #privacy

Go to article at
17.2.2023

Patch Now: Apple's iOS, iPadOS, macOS, and Safari Under Attack with New Zero-Day Flaw

Apple on Mon rolled out security updates for iOS, iPadOS, macOS, and Safari to addressing a WebKit zero-day flaw that it said has been actively exploited in the wild. Users advised to update to iOS 16.3.1 / Safari 16.3.1. #cybersecurity

Go to article at
17.2.2023

Hackers leak passwords for 500,000 Fortinet VPN accounts

❗ 498,908 Fortinet VPN stolen user credentials being shared on dark web forums. Incident is serious - leaked creds can be used to infiltrate the network of a company using the service to steal data or distribute malware. #cybersecurity

Go to article at
15.2.2023