Categories
All things Heimdal
Access Management
Cybersecurity Basics
Cybersecurity interviews
Data security
Endpoint security
Email Security
Financial protection
Forensics and threat hunting
Industry trends
Institutions
Networking
Patch management
Patch Tuesday Updates
Ransomware
Remote Access
Threat center
Security alerts
Latest threats
Vulnerability
How to
Account security
Malware removal
Microsoft Windows
Mobile
Shopping
Social
Cybersecurity News
Resources
Categories
All things Heimdal
Access Management
Cybersecurity Basics
Cybersecurity interviews
Data security
Endpoint security
Email Security
Financial protection
Forensics and threat hunting
Industry trends
Institutions
Networking
Patch management
Patch Tuesday Updates
Ransomware
Remote Access
Threat center
Security alerts
Latest threats
Vulnerability
How to
Account security
Malware removal
Microsoft Windows
Mobile
Shopping
Social
Cybersecurity News
Resources
Cybersecurity Software
Andra Andrioaie
SECURITY ENTHUSIAST
Hi! My name is Andra and I am a passionate writer interested in a variety of topics. I am curious about the cybersecurity world and what I want to achieve through what I write is to keep you curious too!
View My Profile
Application Control 101: Definition, Features, Benefits, and Best Practices
2023.05.19
What Is Patch Management? Definition, Importance, Key Steps, and Best Practices
2023.05.05
What Is IPAM in Networking and Cybersecurity?
2023.05.05
What Is Privilege Escalation?
2023.05.02
What Is Identity and Access Management (IAM)?
2023.04.25
The Zero Trust Security Model Explained
2022.11.22
What Is the Principle of Least Privilege (POLP)?
2022.10.17
Ransomware Hits Media Giant Nikkei’s Asian Unit
2022.05.20
Ransomware Targets Higher Education Institutions
2022.05.19
What Is a Supply Chain Attack?
2022.05.19
Top 10 Attack Vectors Most Exploited by Hackers Revealed
2022.05.18
NerbianRAT Trojan Spreads via Emails
2022.05.17
New Cybersecurity Directive Agreed between the European Parliament and EU Member States
2022.05.16
At Least 14 German Automakers Targeted by Malware Campaign
2022.05.13
BPFdoor Has the Capacity to Bypass Firewalls
2022.05.13
What Is RMM Software?
2022.05.12
South Asian Governments Targeted by Bitter APT Group
2022.05.12
Windows Print Spooler Exploit: the Path for Threat Actors to Perform 65,000 Cyberattacks
2022.05.11
Critical F5 BIG-IP Vulnerability Exploited by Hackers
2022.05.10
National Emergency Declared by Costa Rica Following Conti Cyberattacks
2022.05.09
Caramel Credit Card Theft Is Becoming Increasingly Popular
2022.05.09
Conti’s BazarLoader Replaced with Bumblebee Malware
2022.04.29
Account Takeover Definition. Account Takeover Prevention
2022.04.29
Top Exploited Vulnerabilities in 2021 Revealed by Cybersecurity Firms
2022.04.28
The US Agriculture Sector Targeted with Ransomware Attacks, the FBI Says
2022.04.21
Authentication vs. Authorization: the Difference Explained
2022.04.21
Millions of Laptops Impacted by Lenovo UEFI Firmware Vulnerabilities
2022.04.20
Lazarus Hackers Make Use of Fraudulent Crypto Apps, US Warns
2022.04.19
IcedID Malware Is Being Used in a New Hacking Campaign Targeting the Ukrainian Government
2022.04.18
ZingoStealer: New Malware Making Way on the Threat Landscape
2022.04.15
1
2
3
…
10