Categories
All things Heimdal
Access Management
Cybersecurity Basics
Cybersecurity interviews
Data security
Endpoint security
Email Security
Financial protection
Forensics and threat hunting
Industry trends
Institutions
Networking
Patch management
Patch Tuesday Updates
Ransomware
Remote Access
Threat center
Security alerts
Latest threats
Vulnerability
How to
Account security
Malware removal
Microsoft Windows
Mobile
Shopping
Social
Cybersecurity News
Resources
Categories
All things Heimdal
Access Management
Cybersecurity Basics
Cybersecurity interviews
Data security
Endpoint security
Email Security
Financial protection
Forensics and threat hunting
Industry trends
Institutions
Networking
Patch management
Patch Tuesday Updates
Ransomware
Remote Access
Threat center
Security alerts
Latest threats
Vulnerability
How to
Account security
Malware removal
Microsoft Windows
Mobile
Shopping
Social
Cybersecurity News
Resources
Cybersecurity Software
Mihaela Popa
COMMUNICATIONS & PR OFFICER
Mihaela is a digital content creator for Heimdal® and the proud owner of an old soul and a curious mind. Passionate to learn and discover more about cybersecurity, she will gladly share her latest finds with you.
Navigating PAM Implementation Risks: A Comprehensive Guide for CISOs
2023.09.11
Minneapolis School District Reveals Full Extent of Data Breach
2023.09.07
Vulnerabilities Uncovered: Critical Remote Code Execution Risks in ASUS Routers
2023.09.07
Weaknesses in Cisco ASA SSL VPNs Exploited Through Brute-Force Attacks
2023.08.31
Notorious QakBot Malware Dismantled: $8.6M Seized and 700K Computers Freed
2023.08.31
Enhancing Cybersecurity: How XDR Software Empowers CISOs
2023.08.30
Thousands of Openfire Servers at Risk from Critical CVE
2023.08.24
University of Minnesota Reports Massive Data Breach
2023.08.24
Danish Cloud Hosting Companies Ravaged by Ransomware Attacks
2023.08.24
10 Best ManageEngine Competitors & Alternatives in 2023 [Features & Reviews]
2023.08.23
Cyber Alert: Global Campaign Targets LinkedIn Accounts
2023.08.17
Raccoon Stealer 2.3.0 Malware – A Stealthier Comeback
2023.08.17
What Is Privileged Access Management (PAM)?
2023.08.14
Rhysida Ransomware: The Rise of a New Threat for Healthcare Organizations
2023.08.10
The Aftermath: Dallas Ransomware Attack- 26K Residents Affected
2023.08.10
Enhancing Cybersecurity with Remote Browser Isolation (RBI)
2023.08.09
Mallox Ransomware Witnessing Alarming Surge in Activity
2023.07.21
Critical Zyxel Firewall Vulnerability Exploited in DDOS Attacks
2023.07.21
The Crucial Role of Cyber Essentials in the UK Public Sector
2023.07.20
Why Removing Admin Rights Closes Critical Vulnerabilities in Your Organization
2023.07.19
Just-in-Time Access Explained. What It Means, Benefits and Best Practices of JIT
2023.07.14
Micro-Segmentation: Strengthening Network Security Through Granular Control
2023.07.14
Zoom Vulnerabilities Allow Attackers to Escalate Privileges
2023.07.14
International Diplomats Targeted by Russian Hacking Group APT29
2023.07.13
Top Data Breaches in 2023: Alarming Incidents Impacting Companies
2023.07.07
RedEnergy Stealer Ransomware: A New Threat Targeting Critical Infrastructure
2023.07.06
SMUGX Campaign Targets European Entities
2023.07.06
Ransomware Attackers Dump Students’ Data Online After School Hacks
2023.07.06
Understanding Managed SIEM: Empowering Businesses with Proactive Security
2023.07.03
Cybersecurity Faces Challenges as DDoS Attacks Surge
2023.06.29
1
2
3
…
6