Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Become a Cyberday partner: Features, benefits and best practices

A good and efficient tool such as Cyberday is a great way to work on the organization's cyber secuirty. However, for some organizations that is not enough and the expertise and support of a consultant is needed. Our partner program offers both!

article

6.6.2023

Cyberday Community has been launched!

We just launched a new Community section inside Cyberday. Our goal is to make collaboration with your peers and with us easier and thus help you improve your information security even further!

article

24.3.2023

ISO 27001 standard updated to 2022 version - what changed?

What has changed when comparing 2013 vs. 2022 versions of ISO 27001 and how are these updates visible on Cyberday?‍

article

18.11.2022

Efficient cyber risk management with new autopilot mode

We're constatly searching for ways to automate and create efficient cyber risk management. Our newest additions is risk autopilot mode. It's concept is described on this post.

article

1.6.2022

Infographic: Why is cyber security getting more and more important?

Here's a visual summary of some of the drivers that continue to make cyber security more and more important for all organizations.

article

11.2.2022

Cyberday Teams app is now available!

Our Teams app passed the latest Microsoft tests and is now available from the Teams app store. This article reviews the benefits and deployment of Cyberday's Teams app.

article

1.7.2020

Content update published to Cyberday

We released an update to Cyberday documentation. The goal was to streamline documentation, highlight the most important things and significantly reduce the amount of separately documented items.

article

11.6.2020

Cyberday launched: Frameworks, Teams-integration and much more

Cyberday works now inside a Microsoft Teams and by choosing a framework you can guide your own work. In this blog you'll find a summary from reforms!

article

20.5.2020

Nemty Ransomware Punishes Victims by Posting Their Stolen Data

The Nemty Ransomware is the latest cybercrime operation to create a data leak site to punish victims who refuse to pay ransoms. [...]

Go to article at
15.5.2020
Ransomware

Protecting Remote Workers From Cyber Threats

If you’re reading this from your home while working remotely during the COVID-19 crisis, you’re in good company. A recent study by Global Workplace Analytics showed that even before the coronavirus forced us all into working from home, remote work had grown by 173% over the last 15 years, with nearly 5 million telecommuters in.. The post Protecting Remote Workers From Cyber Threats appeared first on Security Boulevard.

Go to article at
15.5.2020
Employee Negligence

Hackers switched from direct theft of money to gaining control over the infrastructure of companies

Go to article at
15.5.2020
Phishing

Shadow IT accounts with weak passwords endanger organizations

63% of enterprise professionals have created at least one account without their IT department being aware of it, and two-thirds of those have created two or more, the results of a recent 1Password survey have revealed. Even more worryingly, only 2.6% of these 63% use a unique password when they create a new shadow IT account at work and just 13% use a password generator – the rest re-use a memorable password or use a … More → The post Shadow IT accounts with weak passwords endanger organizations appeared first on Help Net Security.

Go to article at
15.5.2020
Outdated Access Rights

Microsoft Teams goes down as Europe starts working from home

As millions of people across Europe choose to work remotely rather than head into the office in the wake of the Coronavirus pandemic, a widely-used communication and collaboration tool has gone down.

Go to article at
15.5.2020
Denial-of-Service Attacks

CCPA privacy requests cost business up to $275k per million consumer records

Organizations who plan on manually processing CCPA data subject requests (DSRs) or data subject access requests will spend between $140k – $275k per million consumer records they have in their systems, according to DataGrail. The CCPA went into effect on January 1, 2020, giving consumers the right to know the data collected about them, to delete data about them, and ensure their data is not sold to third-parties. The report analyzed the number of requests … More → The post CCPA privacy requests cost business up to $275k per million consumer records appeared first on Help Net Security.

Go to article at
15.5.2020
Illegal Personal Data Processing

Researchers disclose DLL loading vulnerabilities in Autodesk, Trend Micro, Kaspersky software

Updated: Privilege escalation and code execution bugs lurked in the applications.

Go to article at
15.5.2020
Unpatched Vulnerabilities

Hackers accessed staff mailboxes at Italian bank Monte dei Paschi

Monte dei Paschi, one of the biggest Italian banks, suffered a cyber attack, hackers accessed the mailboxes of some employees and sent emails to clients. Italian state-owned bank Monte dei Paschi discloses a security breach, hackers have accessed the mailboxes of some employees and sent emails to clients. The news was reported by the Reuters […] The post Hackers accessed staff mailboxes at Italian bank Monte dei Paschi appeared first on Security Affairs.

Go to article at
15.5.2020
Phishing

Why identity theft is "so easy" and what consumers can do to combat the threat

The Identity Theft Resource Center said that the significant new threat to consumer data is as simple as large organizations failing to add a password to protect their cloud-based data.The group estimates about 165 million sensitive records were exposed in 2019 when nearly 15,000 breaches of U.S. private and government organizations were uncovered, a 17% jump from the year before. Their published report mentions noteworthy "credential stuffing" attacks in 2019 included Boost Mobile, Dunkin', and Disney+. Credential stuffing refers to the exploding trend of hackers buying someone's stolen login and password from the dark web, and then using the same combination to access their other online accounts. "The reason it's so easy is because so many of us use the same password for multiple accounts," Identity Theft Resource Center COO James Lee told CBS News' Anna Werner. Werner told "CBS This Morning" that the surest protections are using different password and login combinations for different accounts.

Go to article at
15.5.2020
Phishing