Heimdal
Author Profile

Dora Tudor

Cyber Security Enthusiast

linkedin icon

Dora is a digital marketing specialist within Heimdal™ Security. She is a content creator at heart - always curious about technology and passionate about finding out everything there is to know about cybersecurity.

Latest Articles

Dora Tudor's Recent Articles

News | QUICK READ

Ransomware Attack Suffered by FinalSite Shuts Down Thousands of Websites

The Website Service Provider Has Been the Victim of an Attack that Disrupted Access to Websites for Thousands of Schools Worldwide.

News | QUICK READ

$50 Million Lost to Fraudsters Posing as Broker-Dealers

A Large-Scale Internet-Based Fraud Scheme Made 70 Victims.

News | QUICK READ

A Data Breach Affected Broward Health

1.3 Million People Were Impacted.

News | QUICK READ

Curious Cat App Loses Control of Its Domain

The Popular Social Networking App Suffered a Series of Bizarre Events.

News | QUICK READ

2easy: A New Dark Web Marketplace for Stolen Data

The 2easy Marketplace Is Becoming a Significant Player on the Dark Web.

News | QUICK READ

21 Billion Scam Calls Were Blocked by T-Mobile This Year

It Appears That an Average of 1.8 Billion Scam Calls Are Identified or Blocked Every Month.

News | QUICK READ

Dridex Malware Installed With the Help of Log4j Vulnerability

The Log4j Vulnerability Is Apparently Being Used to Infect Windows Devices with the Dridex Trojan and Linux Devices with Meterpreter.

News | QUICK READ

The TellYouThePass Ransomware Reappeared After the Windows Log4j Attacks

The Vulnerability Is Used in Against Windows and Linux Devices Targeting a Critical Remote Code Execution Bug in the Apache Log4j Library.

News | QUICK READ

The DarkWatchman Malware Was Found Hidden in Windows Registry

The New Malware It’s a Lightweight and Highly-Capable JavaScript RAT.

News | QUICK READ

Phorpiex Botnet Is Becoming Harder to Disrupt

The Botnet Re-emerged With New Peer-to-Peer Command and Control Infrastructure.

News | QUICK READ

Monero Miners Injected in Log4j Through RMI

Threat Actors Have Switched from LDAP Callback URLs to RMI in Order to Increase Their Chances of Success.

News | QUICK READ

The Log4j Vulnerability Is Now Used by State-Backed Hackers

The Threat Actors Are Linked to Governments in China, Iran, North Korea, and Turkey.

News | QUICK READ

Cobalt Strike Is Being Installed by Emotet for Faster Attacks

This Comes Soon After Emotet Started to Test Installing Cobalt Strike Beacons on Infected Devices Instead of Their Regular Payloads.

News | QUICK READ

Espionage Hacking Campaign Is Targeting Telecom Operators

Middle Eastern and Asian Telecommunications and IT Service Companies Are Being Targeted.

News | QUICK READ

New Ransomware Family Deployed in Log4Shell Attacks

Malicious Actors Are Trying to Deploy a Ransomware Family Dubbed Khonsari.

News | QUICK READ

Agent Tesla Spyware Used in Phishing Campaign

The Spyware Is Part of an Ongoing Phishing Effort that Uses Microsoft PowerPoint Slides.

News | QUICK READ

The Ransomware Attack Suffered by Kronos May Cause Weeks of Downtime

It Seems that the Threat Actors Were Able to Infiltrate Kronos’ Systems and Encrypted Servers.

News | INTERMEDIATE READ

All You Need to Know About the New Zero-Day Found in the Log4j Java Library

The Vulnerability Is Already Being Exploited.

News | QUICK READ

ALPHV BlackCat, a New Ransomware

The Ransomware Operation Comes with a Highly-Customizable Feature Set that Allows Attackers to Target a Wide a Large Number of Corporate Environments.

News | QUICK READ

1.6 million WordPress Sites Were Attacked

A Massive Wave of Attacks Originating from 16,000 IPs Was Detected.

News | QUICK READ

Sonicwall Customers That Are Using SMA 100 Series Appliances Were Urged to Patch Critical Bugs

The Multiple Security Flaws Are Rated with CVSS Scores Ranging from Medium to Critical.

News | QUICK READ

Credit Card Swipers Injected into WordPress Plugins

The New Trend Could Allow Hackers to Access the Websites.

News | QUICK READ

Emotet Is Dropping Cobalt Strike

In this Way, the Malicious Actors Could Obtain Immediate Network Access.

News | QUICK READ

A Critical Zoho ManageEngine Desktop Central and Desktop Central MSP Vulnerability Is Exploited by an APT Actor

The RCE Is Apparently Able to Allow for Arbitrary Code Execution by a Remote Attacker.

News | QUICK READ

New Ceeloader Malware Used By Russian-backed Advanced Persistent Threat (APT) Organization Nobelium

Ceeloader Might Be Used to Breach Government and Enterprise Networks Worldwide.

News | QUICK READ

Excel XLL Add-ins Are Pushing a Password-stealing Malware

RedLine Malware Is Able to steal Cookies, User Names, and Passwords, and Other Data Stored in Web Browsers.

News | QUICK READ

Twitter Verified Accounts Targeted as Part of a Large Phishing Attempt

The Phishing Campaign Is Happening After Twitter Removed the Verified Badge from Numerous Verified Profiles.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats