Categories
All things Heimdal
Access Management
Cybersecurity Basics
Cybersecurity interviews
Data security
Endpoint security
Email Security
Financial protection
Forensics and threat hunting
Industry trends
Institutions
Networking
Patch management
Patch Tuesday Updates
Ransomware
Remote Access
Threat center
Security alerts
Latest threats
Vulnerability
How to
Account security
Malware removal
Microsoft Windows
Mobile
Shopping
Social
Cybersecurity News
Resources
Categories
All things Heimdal
Access Management
Cybersecurity Basics
Cybersecurity interviews
Data security
Endpoint security
Email Security
Financial protection
Forensics and threat hunting
Industry trends
Institutions
Networking
Patch management
Patch Tuesday Updates
Ransomware
Remote Access
Threat center
Security alerts
Latest threats
Vulnerability
How to
Account security
Malware removal
Microsoft Windows
Mobile
Shopping
Social
Cybersecurity News
Resources
Cybersecurity Software
Cristian Neagu
DIGITAL CONTENT CREATOR
Cristian is a digital content creator for Heimdal®, passionate about cybersecurity and anything tech-related. Dedicated to discovering and learning new things, he is always striving to improve himself, while keeping it creative and fresh.
Warning: Lazarus Targets Windows IIS Web Servers For Initial Access
2023.05.30
RaidForums Members Data Leaked on New Hacking Forum
2023.05.30
CosmicEnergy: The New Russian-Linked Malware Targets Industrial System
2023.05.26
Buhti Ransomware: Blacktail’s Newest Operation Affects Multiple Countries
2023.05.26
Three New Zero-Day Vulnerabilities Fixed By Apple
2023.05.19
Lemon Gang Pre-Infects 9 Million Android Devices With Malware
2023.05.19
Third-Party Patch Management: A Comprehensive Guide
2023.05.15
Alert: NextGen Data Breach Puts 1 Million User Identities at Risk
2023.05.09
Iranian Threat Groups Mango Sandstorm and Mint Sandstorm Join the PaperCut Attack Spree
2023.05.09
Royal Ransomware Targets the City of Dallas in Ransomware Attack
2023.05.05
What Is Patch Management? Definition, Importance, Key Steps, and Best Practices
2023.05.05
ReconShark – Kimsuky’s Newest Recon Tool
2023.05.05
RTM Locker Ransomware Gang Targets VMware ESXi Servers
2023.04.28
Millions of Records With Sensitive Data Leaked by ICICI Bank
2023.04.21
Trigona Ransomware Deployed Through Vulnerable Microsoft SQL Servers
2023.04.20
Windows Admins Warned About a Critical MSMQ QueueJumper Vulnerability
2023.04.13
Warning: Threat Actors Compromise 3CX Desktop App in a Supply Chain Attack (Updated)
2023.04.12
SD Worx Shuts Down its UK & Ireland IT Systems Following Cyberattack
2023.04.11
Five New Actively Exploited Vulnerabilities Added by CISA to its KEV Catalog
2023.04.10
Best Patch Management Practices to Follow to Keep Your Business Secured
2023.04.07
MSI Breach Claimed By Money Message Ransomware Gang
2023.04.07
Elementor Pro Vulnerability Actively Exploited by Threat Actors
2023.04.03
SCCM Alternative for Patch Management
2023.04.03
APT43: A New Cyberthreat From North Korea
2023.03.30
The U.S. Government Restricts the Use of Spyware, White House Says
2023.03.28
What Is Quishing: QR Code Phishing Explained
2023.03.24
Enhanced Version of the BlackGuard Stealer Spotted in the Wild
2023.03.24
Threat Actors Use the MageCart Malware in New Credit Card Data Stealing Campaign
2023.03.23
New PowerMagic and CommonMagic Malware Used by Threat Actors to Steal Data
2023.03.22
What Is Stack Smashing?
2023.03.17
1
2
3
…
7