Heimdal
Latest Articles

Search Results: wannacry

Here are the guides and articles we found according to your search.

43 results for "wannacry"

Ransomware | INTERMEDIATE READ

WannaCry Ransomware Explained

How one of the most dangerous ransomware outbursts happened. Key lessons organizations should learn.

Data security | INTERMEDIATE READ

Cybersecurity in Healthcare: An In-Depth Guide by Heimdal®

Explore key strategies and tools to safeguard sensitive medical data against emerging threats.

Cybersecurity Basics | INTERMEDIATE READ

What Is Patch Tuesday and Why Does It Matter for Cybersecurity

Let’s look at the significance, process, and benefits for IT professionals

Forensics and threat hunting | INTERMEDIATE READ

Dark Power Ransomware Abusing Vulnerable Dynamic-Link Libraries in Resolved API Flow

An Ongoing Investigation into Emergent Cryptolocking Ransomware Strain.

Cybersecurity News | QUICK READ

The UK Government Shares New Strategy to Boost NHS Cybersecurity by 2030

5 Core Pillars to Minimise the Risk of Cyber Incidents and Improve Response and Recovery.

Cybersecurity News | QUICK READ

North Korean Hackers Target the Healthcare Sector with Ransomware

The Ransomware Operations Are Meant to Bring Illegal Revenue to the North Korean State.

Cybersecurity News | QUICK READ

SPNEGO Vulnerability Lets Attackers Execute Code Remotely

Microsoft Reclassified the Previously Patched Vulnerability as “Critical”.

Cybersecurity News | QUICK READ

Clop Ransomware Uses Viral 'Truebot' Malware to Access Networks

Clop Ransomware Now Utilizing Truebot Malware to Steal Data.

Ransomware | INTERMEDIATE READ

What Is Targeted Ransomware and How Does It Work

Learn How to Tackle Malware that Blocks Basic Computer Functions.

Cybersecurity Basics | INTERMEDIATE READ

What Are the Main Attack Vectors in Cybersecurity?

And how to protect your business from different attack vectors

Cybersecurity Basics | QUICK READ

Most Common Cyber Threats for Businesses

Top Cybersecurity Threats every Company Should Know

Advanced malware researches | SLOW READ

Emotet Malware Over the Years: The History of an Infamous Cyber-Threat

What Is Emotet Malware and How Can You Stop It? Protecting Your Business from the Most Resilient Trojan Out There

Patch management | INTERMEDIATE READ

Software Patching Statistics: Common Practices and Vulnerabilities

How Often and Fast Do Companies Really Apply Updates? How Dangerous (or Not) Are the Common Software Patching Behaviors?

Cybersecurity News | QUICK READ

Lazarus Hacking Group Now Focusing on IT Supply Chain Attacks

Researchers Noticed that Lazarus Has Been Conducting Two Different Supply Chain Attack Operations.

Cybersecurity News | QUICK READ

Over 60% of Organizations Say Would Not Pay Attackers

It’s time to Take Precautions Against Cybercriminals in Order to Be Ready and Safe Against Threat Actors.

Cybersecurity News | QUICK READ

Everything You Need to Know About the WestRock Ransomware Attack

Stages and Data to Date. How Attacks on Operational Technology Became the Next Cyber Boundary.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats