Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

Explore the top 10 responsibilities of a CISO and get best practices for success, covering risk management, collaboration, compliance, and continuous learning.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

article

15.12.2023

How do you benefit from ISO 27001 certification?

Why do organizations choose to go for ISO 27001 certification? In this blog article, we will give you our top 5 reasons to get certified. Certification will certainly benefit your security directly, but there are other kind of benefits available too.

article

25.10.2023

Working towards NIS2 compliance with Cyberday

✈️ You want to lift your cyber security management to a new level & get NIS2 compliant with a smart tool like Cyberday? In this post you'll learn how your organization can achieve NIS2 compliance in a smart way by building an own agile ISMS.

article

23.8.2023

Who does NIS2 apply to? Scope and required security measures explained.

In this post you'll learn about what industries are affected by NIS2, security requirements the directive sets, and the available enforcement methods if an organization is not compliant.

article

23.8.2023

Popular Fitness Apps Leak Location Data Even When Users Set Privacy Zones

🚩 Students discovered: when a user starts fitness activity from home, an attacker can use app's API metadata to pinpoint their home location, even if they've set up an "endpoint privacy zone" (EPZ) for that area. #privacy

Go to article at
21.4.2023

Avoid this "lost injured dog" Facebook hoax

Compromised or new accounts sending hoax posts to e.g. local community groups. Now with "Lost injured dog" approach. This is common - used to great effect in the “dead daughter / free PS5” scam last year. Avoiding hoaxes >> #cybercrime

Go to article at
21.4.2023

FBI and FCC warn about “Juicejacking” – but just how useful is their advice?

Phones charge over USB cables, which carry both power and data. 🪫 When you plug into a USB outlet at an airport, how do you know you're only getting power, not a secret data connection? More info about #juicejacking >> #cybersecurity

Go to article at
21.4.2023

Fake Chrome updates spread malware

⚠️ Campaign (since Nov-22) uses vulnerable, hacked sites to push fake browser updates. Malicious JS shows an update msg and automatically downloads a zip when landing on the page. Opening the file will execute a cryptominer #malware.

Go to article at
21.4.2023

Discarded, not destroyed: Old routers reveal corporate secrets

🗑️ The fate of a discarded routers? ESET purchased a few used ones to investigate. In many cases, previous configurations weren't wiped and data could be used to identify the prior owners and network details. #cybersecurity

Go to article at
21.4.2023

AI chatbots making it harder to spot phishing emails, say experts

⚠️ Europol issues a warning about criminal use of ChatGPT "AI allows crafting very believable ‘spear-phishing’ emails and other written communication with very little effort, especially compared to what you have to do before." #phishing

Go to article at
31.3.2023

Pig butchering scams: The anatomy of a fast‑growing threat

💬 Hyper-connectedness cuts both ways. Scammers also can reach you anytime, any channel. And their techniques are developing. "Pig butchering scams" start with weeks long cold msg chains, to trick people later. Examples >> #cybercrime

Go to article at
31.3.2023

Microsoft Security Copilot is a new GPT-4 AI assistant for cybersecurity

🤖 Microsoft is developing an AI-powered #cybersecurity assistant to help identify breaches and derive smart signals from data. Security Copilot has a chatbot interface like new Bing, and is the latest example of MS's big push with AI.

Go to article at
31.3.2023

New Wi-Fi Protocol Security Flaw Affecting Linux, Android and iOS Devices

⚠️ Researchers uncovered a #vulnerability in IEEE 802.11 Wi-Fi protocol standard: "Attacker can disconnect a victim and connect under his MAC address (using the credentials of the adversary) to steal the data still underway to them."

Go to article at
31.3.2023