Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Become a Cyberday partner: Features, benefits and best practices

A good and efficient tool such as Cyberday is a great way to work on the organization's cyber secuirty. However, for some organizations that is not enough and the expertise and support of a consultant is needed. Our partner program offers both!

article

6.6.2023

Cyberday Community has been launched!

We just launched a new Community section inside Cyberday. Our goal is to make collaboration with your peers and with us easier and thus help you improve your information security even further!

article

24.3.2023

ISO 27001 standard updated to 2022 version - what changed?

What has changed when comparing 2013 vs. 2022 versions of ISO 27001 and how are these updates visible on Cyberday?‍

article

18.11.2022

Efficient cyber risk management with new autopilot mode

We're constatly searching for ways to automate and create efficient cyber risk management. Our newest additions is risk autopilot mode. It's concept is described on this post.

article

1.6.2022

Infographic: Why is cyber security getting more and more important?

Here's a visual summary of some of the drivers that continue to make cyber security more and more important for all organizations.

article

11.2.2022

Cyberday Teams app is now available!

Our Teams app passed the latest Microsoft tests and is now available from the Teams app store. This article reviews the benefits and deployment of Cyberday's Teams app.

article

1.7.2020

Content update published to Cyberday

We released an update to Cyberday documentation. The goal was to streamline documentation, highlight the most important things and significantly reduce the amount of separately documented items.

article

11.6.2020

Cyberday launched: Frameworks, Teams-integration and much more

Cyberday works now inside a Microsoft Teams and by choosing a framework you can guide your own work. In this blog you'll find a summary from reforms!

article

20.5.2020

Over half of organizations were successfully phished in 2019

Nearly 90 percent of global organizations were targeted with BEC and spear phishing attacks in 2019, reflecting cybercriminals’ continued focus on compromising individual end users, a Proofpoint survey reveals. Seventy-eight percent also reported that security awareness training activities resulted in measurable reductions in phishing susceptibility. The report examines global data from nearly 50 million simulated phishing attacks sent by Proofpoint customers over a one-year period, along with third-party survey responses from more than 600 information … More → The post Over half of organizations were successfully phished in 2019 appeared first on Help Net Security.

Go to article at
15.5.2020
Phishing

Is Universal Directory a Replacement for AD?

Whether Universal Directory works for you is ultimately up to your individual requirements, but any AD replacement needs certain capabilities.The post Is Universal Directory a Replacement for AD? appeared first on JumpCloud.The post Is Universal Directory a Replacement for AD? appeared first on Security Boulevard.

Go to article at
15.5.2020
Outdated Access Rights

Scammers siphon off $2.3 million from Texas school district in three transactions

Manor Independent School District (ISD) lost approximately $2.3 million in a phishing scam in three different fraudulent transactions. The scammers carried out the attacks in a variety of ways including disguised email addresses, phone numbers, fake links, etc. Located at a distance of about 15 miles from Austin, Texas, Manor ISD serves more than 9,600 students.

Go to article at
15.5.2020
Phishing

Fake Executive Tricks New York City Medical Center into Sharing Patient Info

An employee at a New York City medical center was tricked into giving out patient information by a threat actor purporting to be one of the facility's executives. In a Notice of Data Privacy Incident statement published on VCRN's website, the company stated: "The unauthorized actor requested certain information related to VCRN patients. Information obtained by the threat actor included first and last names, dates of birth, and medical insurance information, including provider name and ID number for 674 patients. The medical center said that they weren't aware of any personal patient information having been misused as a result of this event. VCRN has taken steps to notify all the patients who have potentially been impacted by the cyber-attack. VCRN advised patients "to remain vigilant against incidents of identity theft and fraud and to review account statements, credit reports, and explanation of benefits forms for suspicious activity and report any suspicious activity immediately to your insurance company, health care provider, or financial institution."

Go to article at
15.5.2020
Phishing

Pirated Software is All Fun and Games Until Your Data’s Stolen

Passwords stolen through software cracks BleepingComputer has been tracking adware bundles for a long time and in the past, they would install unwanted programs, but had no long-term ramifications to your data, privacy, or financial information. Security researcher Benkøw has recently noticed that monetized installers pretending to be software cracks and key generators are now commonly installing password-stealing Trojans or remote access Trojans (RATs) when they are executed. In his tests over the past week by downloading various programs promoted as game cheats, software key generators, and licensed software, when installing them he was infected with password-stealing Trojans and backdoors such as Dreambot, Glupteba, and Racoon Stealer. Distributed via torrent sites, YouTube, and fake crack sites To distribute these adware bundles, attackers will upload them to torrent sites, create fake YouTube videos with links to alleged license key generators, or create sites designed to just promote adware bundles disguised as software cracks.

Go to article at
15.5.2020
Malware

Human-Operated Ransomware Is a Growing Threat to Businesses: Microsoft

Different from auto-spreading ransomware, these are hands-on-keyboard attacks, where attackers adapt to the compromised network’s configuration, and show extensive knowledge of systems administration.

Go to article at
15.5.2020
Ransomware

Racoon Malware Steals Your Data From Nearly 60 Apps

An infostealing malware that is relatively new on cybercriminal forums can extract sensitive data from about 60 applications on a targeted computer. [...]

Go to article at
15.5.2020
Malware

Cost of Insider Threats Rises 31%

New study finds dramatic increase in the cost and frequency of insider threats

Go to article at
15.5.2020
Insider Attacks

BEC Attacks Hit More Than 2,100 Companies throughout the US

A prolific and dangerous group called Exaggerated Lion has been hitting targets in the United States with business email compromise (BEC) attacks that follow a very specific model. They have racked up thousands of attempts and hundreds of millions of dollars stolen every month. The post BEC Attacks Hit More Than 2,100 Companies throughout the US appeared first on Security Boulevard.

Go to article at
15.5.2020
Business-Email-Compromise