Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

What is a vCISO? Understanding the role of virtual CISO

What is a vCISO, what they do, and why the virtual CISO model is growing fast among companies and cybersecurity consultants.

article

12.6.2025

What is a modular cyber security framework and why they are essential for consultants

Modular cyber security frameworks make compliance management easier, and helps consultants scale faster, win more deals, and build recurring revenue.

article

12.6.2025

Cyberday app outage on Tuesday 10/6/2025: Explanation and follow-up

This message goes through the details of the recent incident that produced downtime in Cyberday during 10.6.2025, and related early mitigation.

article

11.6.2025

Kicking Off a Summer of Innovation at Cyberday

This summer, Cyberday is proud to launch an ambitious and inspiring project centered on deep regulatory research and international collaboration. We’ve welcomed 12 talented information security students, who will work together to simplify compliance.

article

10.6.2025

What is CRA? Introduction to Cyber Resilience Act requirements

What is CRA (Cyber Resilience Act)? Learn CRA requirements, who it applies to, and how to prepare for CRA compliance with this complete, practical guide.

article

2.6.2025

NIS2 delays, healthcare breaches & improved Trust Center: Cyberday product and news summary 5/2025 🛡️

This is the May news and product review from Cyberday and also a summary of the latest admin webinar. Read about NIS2 delays, recent cyberattacks as well as recent and future development on Cyberday.

article

30.5.2025

End of hourly billing: why value-based pricing works for compliance consultants

Hourly billing is fading fast in compliance consulting. Learn why value-based pricing better aligns incentives, boosts earnings, and how compliance consultants can transition effectively.

article

26.5.2025

What is an ISMS? A guide to information security management systems

Learn what ISMS is, why it matters, and how to implement an ISMS step-by-step. See how ISO 27001 and NIS2 fit into your information security management system.

article

14.5.2025

Threat Trends: Vulnerabilities

📈 We have another record year in CVE disclosure, already 18000+ disclosed. Still most CVEs never get exploited. How should you prioritize #vulnerability's for treatment? Which are severe, which just get media attention? Article has tips ->

Go to article at
30.9.2022

IT admin admits sabotaging ex-employer’s network in bid for higher salary

⚠️ In a bid to get re-hired w/ a larger salary, ex IT employee admitted to sabotage. Mr Umetsu used his old (!) creds to edit DNS records to misdirect web and email traffic. Now he faces upto 10y in prison. #cybersecurity

Go to article at
30.9.2022

Capital One Phish Showcases Growing Bank-Brand Targeting Trend

Phishers watch the news. 📨 6000 #phishing emails going out daily in a scam targeting identities. Campaign exploits Capital One's new partnership with Authentify, tricking bank's customers into uploading images of ID cards.

Go to article at
30.9.2022

Critical WhatsApp Bugs Could Have Let Attackers Hack Devices Remotely

💊 WhatsApp patches two severe flaws that could lead to RCE attacks. One of them (CVE-2022-36934, CVSS score: 9.8) is an integer overflow #vulnerability that can be exploited through establishing a video call.

Go to article at
30.9.2022

Can your iPhone be hacked? What to know about iOS security

Device's #cybersecurity largely depends on your usage. Examples of things that can compromise an iPhone: 💣 sideloaded apps 📱 malicious apps from App Store 📅 calendar invite scams 🛠️ configuration profiles installed through phishing

Go to article at
23.9.2022

Spell-Checking in Google Chrome, Microsoft Edge Browsers Leaks Passwords

Researchers found an "unintended interaction" with #cybersecurity worries: 🔓 When Chrome's Enhanced Spellcheck or Edge's MS Editor is enabled on your browser, the passwords you type on websites leak to Google and Microsoft.

Go to article at
23.9.2022

$35 Million Fine For Morgan Stanley After Unencrypted, Unwiped Harddrives Are Auctioned

💸 $35 million penalty for Morgan Stanley SEC’s enforcement division: "Improper disposal of thousands of hard drives since 2016 was an 'extensive failure' to safeguard customers’ data (as required by federal regulations)". #cybersecurity

Go to article at
23.9.2022

Malwarebytes blocks Google, YouTube as malware

An amusing #malware protection blunder: 📣 "Malwarebytes is aware of a temporary issue with the web filtering component of our product that may be blocking certain domains, including google.com"

Go to article at
23.9.2022

US government software suppliers must attest their solutions are secure

US gov agencies need to start gathering more evidence from software suppliers: ✅ self-attestation needed from suppliers before using the software ❌ if NIST requirements not followed, more explanation / assessments needed #cybersecurity

Go to article at
16.9.2022