Categories
All things Heimdal
For Home
Data protection
Financial protection
Privacy
For Business
Endpoint security
Data leakage
Patch management
Forensics and threat hunting
Industry trends
Patch Tuesday Updates
Educational resources
Free Courses
Cybersecurity Glossary
Cybersecurity Basics
Daily Security Tip
Threat center
Security alerts
Latest threats
How to
Microsoft Windows
Shopping
Mobile
Social
Account security
Malware removal
Cybersecurity News
Categories
All things Heimdal
For Home
Data protection
Financial protection
Privacy
For Business
Endpoint security
Data leakage
Patch management
Forensics and threat hunting
Industry trends
Patch Tuesday Updates
Educational resources
Free Courses
Cybersecurity Glossary
Cybersecurity Basics
Daily Security Tip
Threat center
Security alerts
Latest threats
How to
Microsoft Windows
Shopping
Mobile
Social
Account security
Malware removal
Cybersecurity News
Cybersecurity Software
Andra Andrioaie
SECURITY ENTHUSIAST
Hi! My name is Andra and I am a passionate writer interested in a variety of topics. I am curious about the cybersecurity world and what I want to achieve through what I write is to keep you curious too!
View My Profile
Ransomware Hits Media Giant Nikkei’s Asian Unit
2022.05.20
Ransomware Targets Higher Education Institutions
2022.05.19
What Is a Supply Chain Attack?
2022.05.19
Top 10 Attack Vectors Most Exploited by Hackers Revealed
2022.05.18
NerbianRAT Trojan Spreads via Emails
2022.05.17
New Cybersecurity Directive Agreed between the European Parliament and EU Member States
2022.05.16
At Least 14 German Automakers Targeted by Malware Campaign
2022.05.13
BPFdoor Has the Capacity to Bypass Firewalls
2022.05.13
What Is RMM Software?
2022.05.12
South Asian Governments Targeted by Bitter APT Group
2022.05.12
Windows Print Spooler Exploit: the Path for Threat Actors to Perform 65,000 Cyberattacks
2022.05.11
Critical F5 BIG-IP Vulnerability Exploited by Hackers
2022.05.10
National Emergency Declared by Costa Rica Following Conti Cyberattacks
2022.05.09
Caramel Credit Card Theft Is Becoming Increasingly Popular
2022.05.09
Conti’s BazarLoader Replaced with Bumblebee Malware
2022.04.29
Account Takeover Definition. Account Takeover Prevention
2022.04.29
Top Exploited Vulnerabilities in 2021 Revealed by Cybersecurity Firms
2022.04.28
The US Agriculture Sector Targeted with Ransomware Attacks, the FBI Says
2022.04.21
Authentication vs. Authorization: the Difference Explained
2022.04.21
Millions of Laptops Impacted by Lenovo UEFI Firmware Vulnerabilities
2022.04.20
Lazarus Hackers Make Use of Fraudulent Crypto Apps, US Warns
2022.04.19
IcedID Malware Is Being Used in a New Hacking Campaign Targeting the Ukrainian Government
2022.04.18
ZingoStealer: New Malware Making Way on the Threat Landscape
2022.04.15
What Is Data Leakage?
2022.04.15
Hospital Robots Have Been Found to Have Critical Vulnerabilities
2022.04.14
SharkBot Is Spread Using Phony Antivirus Apps on Google Play
2022.04.13
Mirai Malware Distributed by Means of Spring4Shell Vulnerability
2022.04.12
New Meta Malware Used in Malspam Campaign
2022.04.11
New Malware Leveraged Cryptominers to Target AWS Lambda
2022.04.08
Identity and Access Management (IAM) Explained: Definition, Benefits and More
2022.04.08
1
2
3
…
10
Live webinar - Lifting The Lid on Automated Patch Management (May 26th, at 1pm BST)
Join Free