Heimdal
Author Profile

Andra Andrioaie

Security Enthusiast

linkedin icon

Hi! My name is Andra and I am a passionate writer interested in a variety of topics. I am curious about the cybersecurity world and what I want to achieve through what I write is to keep you curious too!

Latest Articles

Andra Andrioaie's Recent Articles

News | INTERMEDIATE READ

Application Control 101: Definition, Features, Benefits, and Best Practices

Application Control Works in Tandem with Privileged Access Management. Here’s Everything You Need to Know About It.

Access Management | INTERMEDIATE READ

The Zero Trust Security Model Explained

Never trust, always verify.

News | QUICK READ

Ransomware Hits Media Giant Nikkei’s Asian Unit

Hackers Gained Unauthorized Access to the Company’s Server.

News | QUICK READ

Top 10 Attack Vectors Most Exploited by Hackers Revealed

A Joint Advisory Describes Most Preferred Initial Access Attack Vectors by Threat Actors.

News | QUICK READ

NerbianRAT Trojan Spreads via Emails

Written in GO, the Malware Can Bypass Detection and Analysis.

News | QUICK READ

BPFdoor Has the Capacity to Bypass Firewalls

A New Linux Malware Has Been Discovered That Shows Anti-Evasion Techniques.

Endpoint security | QUICK READ

What Is RMM Software?

All You Need to Know about Remote Monitoring Management Software. A List of Open-Source RMM.

News | QUICK READ

South Asian Governments Targeted by Bitter APT Group

Based on Two Infection Chains, the Campaign Employes Malware with Remote File Execution Capabilities.

News | QUICK READ

Conti’s BazarLoader Replaced with Bumblebee Malware

Similar in Techniques with BazarLoader and IcedID, Bumblebee Is Distributed in Phishing Campaigns.

News | QUICK READ

Top Exploited Vulnerabilities in 2021 Revealed by Cybersecurity Firms

15 Common Flaws of Last Year Now Put Together in a List.

Access Management | INTERMEDIATE READ

Authentication vs. Authorization: Key Differences and Types

Authentication and Authorization Concepts. Authentication & Authorization Methods.

News | QUICK READ

Millions of Laptops Impacted by Lenovo UEFI Firmware Vulnerabilities

If Abused, Hackers Could Deploy and Run Firmware Implants.

News | QUICK READ

Lazarus Hackers Make Use of Fraudulent Crypto Apps, US Warns

The Threat Actors Use Social Engineering Techniques to Lure Victims to Download Malicious Apps.

Cybersecurity Basics | INTERMEDIATE READ

What Is Data Leakage?

Best Practices on Data Leakage Prevention.

News | QUICK READ

Hospital Robots Have Been Found to Have Critical Vulnerabilities

Researchers Named the Flaws Jekyllbot:5.

News | QUICK READ

Mirai Malware Distributed by Means of Spring4Shell Vulnerability

A Flaw in Spring Framework Lets Hackers Download the Mirai Botnet.

News | QUICK READ

New Malware Leveraged Cryptominers to Target AWS Lambda

To Avoid Detection, It Employs Modern Address Resolution Algorithms for C&C Communications.

News | QUICK READ

VLC Media Player Leveraged by Hackers to Distribute Malware Loader

The Threat Actors Employed DLL Side-Loading Techniques.

News | QUICK READ

New RAT Dubbed Borat Emerging on the Cyberthreat Landscape

The Malware Shows a Broad Range of Functionalities.

News | QUICK READ

BlackGuard, a New Info-Stealer, for Sale on Russian Hacking Forums

A “Sophisticated” Malware with Obfuscation and Antibugging Capabilities.

News | QUICK READ

Mars Stealer: a New Popular Malware on the Cyberthreat Landscape

OpenOffice Ads on Google Are Leveraged to Distribute It.

News | QUICK READ

V8 Vulnerability Hits Chrome and Edge

The Bug Is Located in the JavaScript Engine Dubbed V8.

News | QUICK READ

Social Engineering Attacks Target Morgan Stanley Client Accounts

Hackers Managed a Data Breach through Vishing.

Cybersecurity Basics | INTERMEDIATE READ

What Is Data Loss Prevention and How You Can Approach DLP Security

DLP Security Ensures the Integrity of Your Company’s Data. Here’s What You Need to Know About It.

News | QUICK READ

ISPs and Diplomats Targeted by New Mustang Panda Hacking Campaign

The Threat Actors Group Is Leveraging a New Version of Korplug.

News | QUICK READ

Diavol Ransomware Receives Free Decryptor

Use the Free Decryption Tool to Recover Your Files!

News | QUICK READ

BazarBackdoor Malware Distributed via Corporate Website Contact Forms

Threat Actors Employ Different Techniques to Bypass Detection.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats