Advanced malware researches | SLOW READ
Russia-Linked Brute-Force Campaign Targets EU via Microsoft Infrastructure
Updated on 29th July as EU released a report that supports our findings about the telecommunication and energy sectors
Patch management | SLOW READ
Guide to Third Party Risk Management: Dealing with Vendor Vulnerabilities
98% of companies worldwide maintain integrations with at least one third-party vendor that has been compromised within the last two years.
All things Heimdal | INTERMEDIATE READ
Heimdal’s 10th Anniversary - Our Finest Hours
A decade of cyber-tech innovations and community growth.
Endpoint security | QUICK READ
There's Something Phishy About Generative AI
80% of all phishing campaigns use GenAI.
How to | INTERMEDIATE READ
60+ Essential Command Prompt (CMD) Commands
Basic & Advanced Windows Command Prompt Commands.
XDR | INTERMEDIATE READ
Institutions | SLOW READ
Your Comprehensive Guide to ISO 27001 Controls [2024]
ISO 27001 Controls and Guidelines.
Vulnerability | INTERMEDIATE READ
Heimdal®’s Semiannual Rundown of the Most Exploited Vulnerabilities of 2023
A Break-Down of 2023’s Vulnerabilities by Vendor and Impact.
Endpoint security | SLOW READ
10 Best Ivanti Alternatives & Competitors in 2024 [Features, Pricing & Reviews]
Heimdal ranks first as it offers a genuine ‘one platform’ alternative to Ivanti, followed by nine more excellent tools.
Cybersecurity Basics | INTERMEDIATE READ
Ransomware-as-a-Service (RaaS) - The Rising Threat to Cybersecurity
How to Stay Safe From Ransomware-as-a-Service.
Forensics and threat hunting | INTERMEDIATE READ
Nordic Users Targeted by National Danish Police Phishing Attack
Victims Cited to Court over Fake Infantile Cyberpornography Allegations.
Forensics and threat hunting | INTERMEDIATE READ
Dark Power Ransomware Abusing Vulnerable Dynamic-Link Libraries in Resolved API Flow
An Ongoing Investigation into Emergent Cryptolocking Ransomware Strain.
Access Management | SLOW READ
Access Governance Strategy and Technology: How to Plan It Well
What is Access Governance?
Forensics and threat hunting | INTERMEDIATE READ
Dark Power Ransomware on the Ascent – A Technical Insight into 2023’s Latest Ransomware Strain
Dissecting the NIM-Written Dark Power Ransomware.
Vulnerability | INTERMEDIATE READ
Heimdal® Observes Major Shift in OS vs. Third-Party Patch Deployment
Endpoint security | INTERMEDIATE READ
DNS Security 101: The Essentials You Need to Know to Keep Your Organization Safe
All you need to find out about DNS security. Ways to secure your company-owned DNS server.
Forensics and threat hunting | QUICK READ
Consolidating Your Security Operations with Automated Threat Hunting (The Simplified Handbook)
Manual vs. Automated Threat-Hunting in SOC
Forensics and threat hunting | INTERMEDIATE READ
Latest threats | QUICK READ
APT Behind Newly Detected Phishing Campaign Tied to Worldwide Cyberattacks
Access Management | INTERMEDIATE READ
What Is Privilege Escalation? Definition, Types and Examples
Security alerts | QUICK READ
SECURITY ALERT: Heimdal® Identifies Active Phishing Campaign Singleing Out Romanian Telecom Users
Unknown APT Employs Posta Romana as Forefront for Phishing Campaign
Access Management | INTERMEDIATE READ
Cybersecurity Basics | INTERMEDIATE READ
Security alerts | QUICK READ
SECURITY ALERT: Heimdal® Detects Massive MitID Smishing Campaign Targeting Nordea Bank Customers
Threat Actors Employ Legitimate Web Services to Steal Banking Credentials.
One Platform. Total Security.
Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats