Categories
All things Heimdal
Access Management
Cybersecurity Basics
Cybersecurity interviews
Data security
Endpoint security
Email Security
Financial protection
Forensics and threat hunting
Industry trends
Institutions
Networking
Patch management
Patch Tuesday Updates
Ransomware
Remote Access
Threat center
Security alerts
Latest threats
Vulnerability
How to
Account security
Malware removal
Microsoft Windows
Mobile
Shopping
Social
Cybersecurity News
Resources
Categories
All things Heimdal
Access Management
Cybersecurity Basics
Cybersecurity interviews
Data security
Endpoint security
Email Security
Financial protection
Forensics and threat hunting
Industry trends
Institutions
Networking
Patch management
Patch Tuesday Updates
Ransomware
Remote Access
Threat center
Security alerts
Latest threats
Vulnerability
How to
Account security
Malware removal
Microsoft Windows
Mobile
Shopping
Social
Cybersecurity News
Resources
Cybersecurity Software
Mihaela Marian
COMMUNICATIONS & PR OFFICER
Mihaela is a digital content creator for Heimdal® and the proud owner of an old soul and a curious mind. Passionate to learn and discover more about cybersecurity, she will gladly share her latest finds with you.
OAuth Explained: A Guide to Understanding What It Is and How It Works
2023.02.02
Identity Reveal: Threat Actor Behind Golden Chicken Malware Service Exposed
2023.01.30
Aurora Infostealer Malware Deploys Shapeshifting Tactics
2023.01.27
How to Choose Between Access Control Models? RBAC vs. ABAC vs. PBAC
2023.01.27
Lazarus Group Is Responsible for $100 Million Cryptocurrency Theft
2023.01.26
Russian Hackers Responsible for Attack on Samsung
2023.01.20
BackdoorDiplomacy Is Going after Iranian Government Entities
2023.01.19
Policy-Based Access Control (PBAC) – The Complete Know How for Organizations
2023.01.19
Malicious VPN Installers Used to Infect Devices with Spyware
2023.01.16
Microsoft’s VALL-E AI Needs 3 Seconds to Realistically Imitate Your Voice
2023.01.13
How to Mitigate Insider Threat – A Best Practices Guide for Organizations
2023.01.12
High Severity Vulnerability Discovered in the JsonWebToken Library
2023.01.12
StrongPity Hackers Are Targeting Android Users via Malicious Telegram App
2023.01.11
Altered Zoom App Found Delivering Banking Malware
2023.01.10
US Nuclear Research Labs Hit by Russian Hackers
2023.01.09
British Schools Have Their Data Leaked by Vice Society Ransomware Gang
2023.01.06
Bluebottle Cybercrime Group Is Targeting Banks in African Countries
2023.01.06
How to Prevent Identity Theft With 20 Essential Steps [Updated 2023]
2023.01.05
Critical Vulnerabilities Expose Automotive Giants to Cyberthreats
2023.01.04
Ransomware Gang Clones Website to Leak Stolen Data
2023.01.03
FIN7 Hackers Use Checkmarks to Exploit Microsoft Exchange Servers
2022.12.23
What Is Credential Management?
2022.12.22
Russian Hackers Targeted Petroleum Refinery in NATO Country
2022.12.21
Australian Fire and Rescue Service Confirms Cyber Attack
2022.12.20
FBI Info Sharing Platform InfraGard Was Hacked
2022.12.19
LEGO Tackles Security Flaws, Avoids BrickLink Compromise
2022.12.16
What Is CARTA? Continuous Adaptive Risk and Trust Assessment Explained
2022.12.15
GoTrim Botnet Goes After WordPress Admin Accounts
2022.12.14
Python and JavaScript Developers Exposed to Malware Infections
2022.12.13
Antwerp Goes Offline Following Ransomware Attack (Updated)
2022.12.13
1
2
3
4