Categories
All things Heimdal
Access Management
Cybersecurity Basics
Cybersecurity interviews
Data security
Endpoint security
Email Security
Financial protection
Forensics and threat hunting
Industry trends
Institutions
Networking
Patch management
Patch Tuesday Updates
Ransomware
Remote Access
Threat center
Security alerts
1
Latest threats
Vulnerability
How to
Account security
Malware removal
Microsoft Windows
Mobile
Shopping
Social
Cybersecurity News
Resources
Categories
All things Heimdal
Access Management
Cybersecurity Basics
Cybersecurity interviews
Data security
Endpoint security
Email Security
Financial protection
Forensics and threat hunting
Industry trends
Institutions
Networking
Patch management
Patch Tuesday Updates
Ransomware
Remote Access
Threat center
Security alerts
1
Latest threats
Vulnerability
How to
Account security
Malware removal
Microsoft Windows
Mobile
Shopping
Social
Cybersecurity News
Resources
Cybersecurity Software
Mihaela Marian
COMMUNICATIONS & PR OFFICER
Mihaela is a digital content creator for Heimdal® and the proud owner of an old soul and a curious mind. Passionate to learn and discover more about cybersecurity, she will gladly share her latest finds with you.
Policy-Based Access Control (PBAC) – The Complete Know How for Organizations
2023.01.19
Malicious VPN Installers Used to Infect Devices with Spyware
2023.01.16
Microsoft’s VALL-E AI Needs 3 Seconds to Realistically Imitate Your Voice
2023.01.13
How to Mitigate Insider Threat – A Best Practices Guide for Organizations
2023.01.12
High Severity Vulnerability Discovered in the JsonWebToken Library
2023.01.12
StrongPity Hackers Are Targeting Android Users via Malicious Telegram App
2023.01.11
Altered Zoom App Found Delivering Banking Malware
2023.01.10
US Nuclear Research Labs Hit by Russian Hackers
2023.01.09
British Schools Have Their Data Leaked by Vice Society Ransomware Gang
2023.01.06
Bluebottle Cybercrime Group Is Targeting Banks in African Countries
2023.01.06
How to Prevent Identity Theft With 20 Essential Steps [Updated 2023]
2023.01.05
Critical Vulnerabilities Expose Automotive Giants to Cyberthreats
2023.01.04
Ransomware Gang Clones Website to Leak Stolen Data
2023.01.03
FIN7 Hackers Use Checkmarks to Exploit Microsoft Exchange Servers
2022.12.23
What Is Credential Management?
2022.12.22
Russian Hackers Targeted Petroleum Refinery in NATO Country
2022.12.21
Australian Fire and Rescue Service Confirms Cyber Attack
2022.12.20
FBI Info Sharing Platform InfraGard Was Hacked
2022.12.19
LEGO Tackles Security Flaws, Avoids BrickLink Compromise
2022.12.16
What Is CARTA? Continuous Adaptive Risk and Trust Assessment Explained
2022.12.15
GoTrim Botnet Goes After WordPress Admin Accounts
2022.12.14
Python and JavaScript Developers Exposed to Malware Infections
2022.12.13
Antwerp Goes Offline Following Ransomware Attack (Updated)
2022.12.13
Unpatched Vulnerabilities Cause Pulse Connect Secure Hosts to Be at Risk
2022.12.12
Zero Standing Privileges (ZSP) for Organizations: Less Privileges, More Security
2022.12.09
Zerobot: New Botnet Campaign Exploits Vulnerabilities
2022.12.08
BlackProxies Service Gains Notoriety in the Cybercrime World
2022.12.06
FreeBSD Systems Exposed to Compromise Due to Ping Vulnerability
2022.12.06
Separation of Privilege (SoP) 101: Definition and Best Practices
2022.12.05
Trending TikTok Challenge Used to Deploy Malware
2022.11.29
1
2
3
4