Heimdal
Author Profile

Andra Andrioaie

Security Enthusiast

linkedin icon

Hi! My name is Andra and I am a passionate writer interested in a variety of topics. I am curious about the cybersecurity world and what I want to achieve through what I write is to keep you curious too!

Latest Articles

Andra Andrioaie's Recent Articles

Access Management | SLOW READ

Application Control 101: Definition, Features, Benefits, and Best Practices

Application Control Works in Tandem with Privileged Access Management. Here’s Everything You Need to Know About It.

Access Management | INTERMEDIATE READ

The Zero Trust Security Model Explained

Never trust, always verify.

Cybersecurity News | QUICK READ

Ransomware Hits Media Giant Nikkei’s Asian Unit

Hackers Gained Unauthorized Access to the Company’s Server.

Cybersecurity News | QUICK READ

Ransomware Targets Higher Education Institutions

Three Educational Institutions Hit by Ransomware over Three Months.

Cybersecurity News | QUICK READ

Top 10 Attack Vectors Most Exploited by Hackers Revealed

A Joint Advisory Describes Most Preferred Initial Access Attack Vectors by Threat Actors.

Cybersecurity News | QUICK READ

NerbianRAT Trojan Spreads via Emails

Written in GO, the Malware Can Bypass Detection and Analysis.

Cybersecurity News | QUICK READ

New Cybersecurity Directive Agreed between the European Parliament and EU Member States

The New Legislation Will Bring About a Greater Cybersecurity Level across the European Union.

Cybersecurity News | QUICK READ

BPFdoor Has the Capacity to Bypass Firewalls

A New Linux Malware Has Been Discovered That Shows Anti-Evasion Techniques.

Endpoint security | QUICK READ

What Is RMM Software?

All You Need to Know about Remote Monitoring Management Software. A List of Open-Source RMM.

Cybersecurity News | QUICK READ

South Asian Governments Targeted by Bitter APT Group

Based on Two Infection Chains, the Campaign Employes Malware with Remote File Execution Capabilities.

Cybersecurity News | QUICK READ

Windows Print Spooler Exploit: the Path for Threat Actors to Perform 65,000 Cyberattacks

Global Cyberattacks Have Grown Following Hacker’s Exploitation of a Print Spooler Bug.

Cybersecurity News | QUICK READ

Critical F5 BIG-IP Vulnerability Exploited by Hackers

Several F5 BIG-IP Modules Are Impacted.

Cybersecurity News | QUICK READ

Conti’s BazarLoader Replaced with Bumblebee Malware

Similar in Techniques with BazarLoader and IcedID, Bumblebee Is Distributed in Phishing Campaigns.

Cybersecurity News | QUICK READ

Top Exploited Vulnerabilities in 2021 Revealed by Cybersecurity Firms

15 Common Flaws of Last Year Now Put Together in a List.

Cybersecurity News | QUICK READ

The US Agriculture Sector Targeted with Ransomware Attacks, the FBI Says

Threat Actors Might Take Advantage of the Harvest Season.

Access Management | INTERMEDIATE READ

Authentication vs. Authorization: the Difference Explained

Authentication and Authorization Concepts. Authentication & Authorization Methods.

Cybersecurity News | QUICK READ

Millions of Laptops Impacted by Lenovo UEFI Firmware Vulnerabilities

If Abused, Hackers Could Deploy and Run Firmware Implants.

Cybersecurity News | QUICK READ

Lazarus Hackers Make Use of Fraudulent Crypto Apps, US Warns

The Threat Actors Use Social Engineering Techniques to Lure Victims to Download Malicious Apps.

Cybersecurity News | QUICK READ

IcedID Malware Is Being Used in a New Hacking Campaign Targeting the Ukrainian Government

Threat Actors Are Exploiting a Zimbra Vulnerability in the Second Stage of the Cyberattacks.

Cybersecurity News | QUICK READ

ZingoStealer: New Malware Making Way on the Threat Landscape

ZingoStealer Has the Capacity to Propagate Crypto-Mining Malware.

Cybersecurity Basics | INTERMEDIATE READ

What Is Data Leakage?

Best Practices on Data Leakage Prevention.

Cybersecurity News | QUICK READ

SharkBot Is Spread Using Phony Antivirus Apps on Google Play

An Info-Stealer Now Targeting Android Devices.

Cybersecurity News | QUICK READ

Mirai Malware Distributed by Means of Spring4Shell Vulnerability

A Flaw in Spring Framework Lets Hackers Download the Mirai Botnet.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats