Heimdal
Author Profile

Andra Andrioaie

Security Enthusiast

linkedin icon

Hi! My name is Andra and I am a passionate writer interested in a variety of topics. I am curious about the cybersecurity world and what I want to achieve through what I write is to keep you curious too!

Latest Articles

Andra Andrioaie's Recent Articles

News | QUICK READ

Heimdal™ and Bechtle UK Partner Up for an Exquisite Webinar on the CyberSec Threat Outlook

Save Your Seat to Gain Insightful Knowledge into the Cyberattacks’ Landscape!

News | QUICK READ

Molerats APT Makes a Comeback Now Leveraging NimbleMamba Malware

Using an Intelligence-gathering Trojan, Threat Actors Are Deploying a Malicious Campaign.

News | QUICK READ

Hacking Group 'ModifiedElephant' Has Been Living Out of Sight for a Long Time

Now Its Activities Have Been Unveiled by Reseachers.

News | QUICK READ

Maze, Egregor and Sekhmet Master Decryption Keys Provided by Their Developer

If You’ve Been Infected with These Ransomware Families, Check This Out!

News | QUICK READ

News Corp Reportedly Targeted by Chinese Hackers

Many Journalists Were Impacted.

News | QUICK READ

Medusa Malware Increases the Number of Android SMS Phishing Cyberattacks

Aka Tanglebot, the Banking Trojan Poses as Malicious Apps.

News | QUICK READ

New Backdoor Deployed by Chinese Hackers Targets Taiwanese Financial Institutions

A Recent Report Reveals Techniques of Deploying xPack in a “Persistent” Malicious Campaign.

News | QUICK READ

New SEO Poisoning Campaign Is Wreaking Havoc on the Cyberthreat Landscape

Batloader and Atera Agent Malware Can Compromise Your System.

News | QUICK READ

Samba Vulnerability Can Trigger RCE and Complete Root User Access

A New Bug in the VFS Module Can Let Hackers Compromise Your Network.

News | QUICK READ

Critical WordPress Plugin RCE Impacts 600K Sites

Users Who Are Still Exposed Should Immediately Upgrade to the Latest Released Version.

News | QUICK READ

Natural Silk Fibers Used by Researchers to Generate Secure Keys

A New Method to Create PUF-based Tags for a Stronger Authentication.

News | QUICK READ

Dark Herring Malware on the Hunt for 105M Android Devices

Compromised Android Apps that Steal Your Money!

News | QUICK READ

TrickBot Crashes Browser Tabs to Hinder Malware Analysis

New Techniques Employed by the Well-Known Modular Trojan Makes the Life of Security Researchers Harder.

News | QUICK READ

Critical SonicWall RCE Bug Actively Targeted by Threat Actors

Patched in the Past, Exploited in the Present.

News | QUICK READ

‘Anomalous’ Spyware Targets Industrial Companies

These Cyberattacks Show Particularities in the Methods Leveraged by Threat Actors.

News | QUICK READ

Crypto Wallets and Passwords Targeted by BHUNT Malware

The Stealer Can Avoid Detection and Includes Several Modules.

News | QUICK READ

Cybercriminals Sell Stolen Financial Details on Telegram

This Activity Decreased in 2021, However, It Still Continues.

News | QUICK READ

Stolen Credit Cards Biggest Dark Web Marketplace Closes Down

The Threat Actors Earned $358 Million in Purchases, According to Researchers.

News | QUICK READ

Ukraine Targeted in False Ransomware Attacks, Microsoft Warns

The Cyberattacks Base upon Data-Wiping Activities.

News | QUICK READ

Free Unofficial Patch for Windows 'RemotePotato0' Now Available

Threat Actors Could Abuse It to Trigger a Wave of NTLM Relay Attacks.

Cybersecurity Basics | INTERMEDIATE READ

What Is Risk-Based Vulnerability Management?

How It Works: Defining the RBVM Process. Find Out How It Is Different from Legacy Vulnerability Management.

News | QUICK READ

Amazon and Azure Cloud Services Abused in a Malicious Trio RAT Campaign

Threat Actors Employ a Cocktail of Remote Access Trojans to Perform Private Data Theft.

News | QUICK READ

False Omicron Stat Counter App Embedded with New RedLine Malware Version

A Recent Variant of the Well-Known Info-Stealer RedLine Has Emerged.

News | QUICK READ

Microsoft Shares Details on macOS Bug

Potential Exploitation of a Recently Patched Flaw in macOS Can Lead to Private Data Exposure.

News | QUICK READ

Cybersecurity Researchers and Developers Targeted in a Malicious Campaign Spreading dnSpy

Cyberattacks Leveraging Fake dnSpy Delivered a Cocktail of Malware.

News | QUICK READ

JNDI Vulnerability in H2 Database Similar to Log4Shell

Researchers Have Located a Bug in the Open-Source Java SQL Database.

News | QUICK READ

‘Elephant Beetle’ Threat Actor Is Stealing Money from Companies

A New Report Reveals Details about an Organized Financial-Theft Operation.

News | QUICK READ

DatPiff Data Breach Has an Impact on Millions of People, Have I Been Pwned Warns

Apparently Multiple Passwords of the Online Distribution Platform Have Been Put for Sale Online.

News | QUICK READ

Japanese Organizations Are Now the Targets of BlackTech APT Group

The Threat Actors Use the Flagpro Malware to Hack Japanese Firms.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats