Heimdal
Author Profile

Cezarina Dinu

Head of Marketing Communications & PR

linkedin icon

Cezarina is the Head of Marketing Communications and PR within Heimdal® and a cybersecurity enthusiast who loves bringing her background in content marketing, UX, and data analysis together into one job. She has a fondness for all things SEO and is always open to receiving suggestions, comments, or questions.

Latest Articles

Cezarina Dinu's Recent Articles

News | QUICK READ

FBI: BEC Scammers Now Impersonate Construction Companies

Since They Don’t Use Malware or Malicious URLs That Can Be Detected with Standard Cyber Defenses, these BEC Attacks Are Difficult to Trace.

News | QUICK READ

Ragnar Locker Ransomware Hits Electronics Maker ADATA

The Threat Actors Claim They Have Stolen 1.5TB Of Sensitive Data from the Company’s Network Before Deploying the Ransomware Payloads.

Cybersecurity Basics | QUICK READ

What Is Protocol and Its Types in Networking?

Defining a Protocol in Computer Network Science. Types of Networking Protocols.

News | QUICK READ

Accellion Data Breach Impacts NSW Health

New South Wales Health Is the Latest Australian Government Entity to Confirm Being Impacted by A Vulnerability in the FTA.

News | QUICK READ

New Evil Corp Ransomware Bypasses OFAC Sanctions by Mimicking PayloadBin Gang

PayloadBIN Has Been Linked to the Evil Corp Cybercrime Gang Who Uses It to Avoid Sanctions Imposed by the Treasury Department’s Office of Foreign Assets Control.

News | QUICK READ

REvil Ransomware Responsible for the JBS Attack, FBI Says

The Agency Revealed in A Statement That It Is Working to Bring the Threat Actors to Justice.

News | QUICK READ

Huawei USB LTE Dongles Are Prone to Attacks Due to A Privilege Escalation Flaw

According to Cybersecurity Analysts, Threat Actors Can Exploit This Vulnerability to Launch Privilege Escalation Attacks.

Cybersecurity Basics | QUICK READ

What Is CERT in Security and Why Do You Need It?

A Brief History of CERT. The Role of CERT in Information Security.

News | QUICK READ

FBI Reveals APT Hackers Breached U.S. Local Government by Exploiting Fortinet Bugs

The Agency Disclosed That Foreign Hackers Had Breached A Local US Municipal Government’s Network After Exploiting Vulnerabilities in An Unpatched Fortinet Server.

News | QUICK READ

New Rowhammer Attack Technique Discovered by Google

The Tech Giant Released the Details of a New Rowhammer Vulnerability Dubbed “Half-Double” That Exploits Increasingly Smaller DRAM Chips.

News | QUICK READ

AHRC: 'High-Risk' Facial Recognition Should Be Banned

The Commission Has Requested A Moratorium on the Use of Biometrics, Including Facial Recognition, in ‘High-Risk’ Areas.

News | QUICK READ

Hydra Cryptocurrency Transactions Reached $1.37bn in 2020

In Its Three Most Recent Years 2018 To 2020, There Was A Staggering 624% Year-Over-Year Growth Rate for the Russian Dark Web Marketplace.

News | QUICK READ

European Court Rules GCHQ Mass Surveillance Powers Violated Human Rights

Britain’s GCHQ Eavesdropping Agency Breached Citizens’ Privacy and Free Expression Rights by Intercepting and Harvesting Vast Amounts of Communications.

News | QUICK READ

Indonesian Government Bans Raid Forums Website After Alleged Leak

The Ministry of Communications and Information Identified Raid Forums as A Platform That Shares Content That Violates the Country’s Laws.

News | QUICK READ

Apple Fixes MacOS Vulnerability Exploited by XCSSET Malware

The Flaw Allows Threat Actors to Bypass Apple’s TCC Protections Which Safeguard Privacy.

News | QUICK READ

Windows HTTP Vulnerability Also Impacts WinRM Servers

The Critical Bug Logged As CVE-2021-31166 Was Patched by the Tech Giant During May Patch Tuesday.

News | QUICK READ

Expired SSL Certificate Blocks Microsoft Exchange Admin Portal

The Portal Is Currently Inaccessible from Some Browsers After Microsoft Forgot to Renew the SSL Certificate for the Website.

Cybersecurity Basics | INTERMEDIATE READ

CryLock Ransomware Explained: Origins, How It Works and How to Remove It

What Is CryLock Ransomware? CryLock Ransomware Removal Instructions.

News | QUICK READ

Conti Ransomware Releases Decryptor for Ireland’s Health Service, Still Threatens to Sell Data

The Ransomware Gang Warns That They Will Still Sell or Release the Stolen Data Unless the $20 Million Ransom Is Paid.

News | QUICK READ

Android Patches 4 New Zero-Day Vulnerabilities Exploited in the Wild

The May 2021 Android Security Bulletin Revealed That the Security Flaws Were Patched Earlier This Month by Arm and Qualcomm.

News | QUICK READ

Cobalt Strike - A Common Tool in the Arsenal of Cybercriminals

A Report Published by Intel 471 Analysts Shows How the Penetration Testing Tool Is Being Abused by Threat Actors.

News | QUICK READ

Toyota Australia Rebuilt IT System Following the 2019 Cyberattack

This Is A Reminder that Careful SAM Planning Can Help You Avoid Some Nasty Security and Compliance Issues.

News | QUICK READ

Avaddon Ransomware Hits Insurance Giant AXA

The French Insurer Revealed That One of Its Asian Subsidiaries Was Hit by A Ransomware Attack Over the Weekend, After Dropping Support for Ransom Payments.

News | QUICK READ

Everything You Need to Know About the WestRock Ransomware Attack

Stages and Data to Date. How Attacks on Operational Technology Became the Next Cyber Boundary.

Cybersecurity Basics | INTERMEDIATE READ

What Is Bandwidth Usage and How Can You Monitor It?

Types of Bandwidth: Pros and Cons. How to Reduce Bandwidth Usage on Your Networks.

News | INTERMEDIATE READ

Everything You Need to Know About the 2021 Facebook Data Breach

Why the 2021 Facebook Data Breach Is A Serious Matter and How You Can Protect Your Personal Information.

Cybersecurity Basics | QUICK READ

What Is SNMP In Computer Network Science?

Defining SNMP Components. SNMP Protocol Data Units.

Cybersecurity Basics | QUICK READ

What Is A Packet Sniffer and How Does It Work?

Benefits of Using A Packet Sniffer. Packet Sniffing Best Practices.

Cybersecurity Basics | QUICK READ

What Is Registry Management and Why Is It Important?

Registry Management Lifecycle. Advantages of Using Registry Management.

Cybersecurity Basics | QUICK READ

What Is ITSM Software and How Does It Work?

Understanding ITSM Processes. Benefits of Using ITSM Software.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats