Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

From Compliance to Collaboration: How NIS2 Encourages Stronger Supply Chain Security Collaboration

Discover how NIS2 shifts focus from simple compliance to creating collaborative security partnerships, enhancing supply chain resilience and trust. 

article

25.10.2024

Agendium Ltd is now Cyberday Inc.!

We are thrilled to announce that our company is entering an exciting new chapter with an updated brand, from Agendium Ltd to Cyberday Inc, our new name better reflects our entity, and the direction we are heading.

article

24.10.2024

10 compliance traps & how to avoid them

Explore crucial cyber security compliance pitfalls for SMEs, from outdated policies to insider threats, and learn effective strategies to mitigate risks and enhance security measures.

article

18.10.2024

ISO 9001 standard: A peek inside the Quality framework

This blog post explores ISO 9001, the globally recognized standard for quality management systems (QMS), benefits for utilizing the standard and its significance in today’s competitive business environment.

article

8.10.2024

Navigating the Cybersecurity Maze: Master NIS2 with the help of ISO 27001

Learn how to master NIS2 with ISO 27001 and grab our free NIS2 e-book! This blog post was originally written for the Cyber Security Nordic 2024 event where Cyderday is presented as Strategic partner.

article

3.10.2024

Corporate Security Alert: Identifying Dangerous Apps on Employee Phones

This article uncovers hidden security risks of popular apps on work devices, covering social media, messaging, cloud storage, gaming, utility, health, VPN, and shopping apps, with recommendations to safeguard corporate data.

article

20.9.2024

NIS2 national legistation, ransomware and a new development forum: Cyberday product and news round-up 9/2024 🛡️

This is the September news and product review from Cyberday. Read news about ransomware, new phishing techniques and local NIS2-legistations.

article

20.9.2024

IT and OT Cyber Security: Different Environments, Different Priorities

This blog post outlines the key differences between IT and OT cyber security, focusing on their distinct areas, objectives, environments, threat landscapes, and compliance requirements.

article

4.9.2024

7 reasons why cybercriminals want your personal data

Kun vuorovaikutus teknologian kanssa syvenee, digitaalinen jalanjälkemme kasvaa ja jättää arvokkaita tietoja, joita kyberrikolliset saattavat käyttää hyväkseen. Mutta miksi datamme on niin houkuttelevaa? 🔒 #privacy

Go to article at
26.4.2024

7 reasons why cybercriminals want your personal data

As our interactions with digital technology deepen, our digital footprints expand, leaving a trail of valuable data that can be exploited by cybercriminals. But why our data is so appealing? Check also tips to protect yourself. 🔒 #privacy

Go to article at
26.4.2024

Nespresso Domain Serves Up Steamy Cup of Phish, No Cream or Sugar

☕️ A phishing campaign has been exploiting a bug on Nespresso's website to bypass security measures by using nested or hidden links. This method exploits an open redirect vulnerability, redirecting victims from trusted domain. 🎣 #phishing

Go to article at
26.4.2024

Cannes Hospital Cancels Medical Procedures Following Cyberattack

🛡️ The Cannes Hospital recently experienced a #cyberattack, leading to a complete shutdown of computer systems as a containment measure. This forced hospital staff to revert to manual, paper-based methods to continue patient care. ✍️

Go to article at
26.4.2024

IT and Cybersecurity Jobs in the Age of Emerging AI Technologies

AI is significantly reshaping the IT and cybersecurity industries. There's concerns, but it also fosters innovation and operational efficiency and In cybersecurity, AI can help mitigate growing threats from cyberattacks. 🤖 #cybersecurity

Go to article at
26.4.2024

Behavioral Patterns of Ransomware Groups are Changing

📈 This report details significant changes in the ransomware threat landscape: Near 20% increase in ransomware victims. and major shifts in tactics by RaaS groups, particularly after law enforcement interventions. 🚨 #ransomware

Go to article at
26.4.2024

Cyberattack Takes Frontier Communications Offline

#cyberattack 🚨 Texas-based Frontier Communications has temporarily ceased operations due to a cyberattack on April 14, which compromised parts of its IT systems and led to the theft of personally identifiable information (PII). 📑

Go to article at
19.4.2024

Cybersecurity’s Human Factor: Merging Tech with People-Centric Strategies

💡 By prioritizing human-centric security and advanced proactive measures, organizations can forge a cybersecurity environment where technological robustness and user experience coexist harmoniously, setting new standards. #cybersecurity

Go to article at
19.4.2024

Thinking outside the code: How the hacker mindset drives innovation

In this article the value of ethical hacking in strengthening #cybersecurity measures was highlighted. Ethical hackers play a critical role in identifying vulnerabilities that even the most sophisticated companies might miss. 🛡️ 🚩

Go to article at
19.4.2024