Advanced malware researches | SLOW READ
Russia-Linked Brute-Force Campaign Targets EU via Microsoft Infrastructure
Updated on 29th July as EU released a report that supports our findings about the telecommunication and energy sectors
Patch management | SLOW READ
Guide to Third Party Risk Management: Dealing with Vendor Vulnerabilities
98% of companies worldwide maintain integrations with at least one third-party vendor that has been compromised within the last two years.
All things Heimdal | INTERMEDIATE READ
Heimdal’s 10th Anniversary - Our Finest Hours
A decade of cyber-tech innovations and community growth.
Endpoint security | QUICK READ
There's Something Phishy About Generative AI
80% of all phishing campaigns use GenAI.
How to | INTERMEDIATE READ
60+ Essential Command Prompt (CMD) Commands
Basic & Advanced Windows Command Prompt Commands.
XDR | INTERMEDIATE READ
Institutions | SLOW READ
Your Comprehensive Guide to ISO 27001 Controls [2024]
ISO 27001 Controls and Guidelines.
Patch management | SLOW READ
12 Best Windows Server Patch Management Software & Tools 2025
Top Tools for Efficient Windows Server Patching.
Vulnerability | INTERMEDIATE READ
Heimdal®’s Semiannual Rundown of the Most Exploited Vulnerabilities of 2023
A Break-Down of 2023’s Vulnerabilities by Vendor and Impact.
Endpoint security | SLOW READ
10 Best Ivanti Alternatives & Competitors in 2025
Heimdal ranks first as it offers a genuine ‘one platform’ alternative to Ivanti, followed by nine more excellent tools.
Cybersecurity Basics | INTERMEDIATE READ
Ransomware-as-a-Service (RaaS) - The Rising Threat to Cybersecurity
How to Stay Safe From Ransomware-as-a-Service.
Forensics and threat hunting | INTERMEDIATE READ
Nordic Users Targeted by National Danish Police Phishing Attack
Victims Cited to Court over Fake Infantile Cyberpornography Allegations.
Forensics and threat hunting | INTERMEDIATE READ
Dark Power Ransomware Abusing Vulnerable Dynamic-Link Libraries in Resolved API Flow
An Ongoing Investigation into Emergent Cryptolocking Ransomware Strain.
Access Management | SLOW READ
Access Governance Strategy and Technology: How to Plan It Well
What is Access Governance?
Forensics and threat hunting | INTERMEDIATE READ
Dark Power Ransomware on the Ascent – A Technical Insight into 2023’s Latest Ransomware Strain
Dissecting the NIM-Written Dark Power Ransomware.
Vulnerability | INTERMEDIATE READ
Heimdal® Observes Major Shift in OS vs. Third-Party Patch Deployment
Endpoint security | INTERMEDIATE READ
DNS Security 101: The Essentials You Need to Know to Keep Your Organization Safe
All you need to find out about DNS security. Ways to secure your company-owned DNS server.
Forensics and threat hunting | QUICK READ
Consolidating Your Security Operations with Automated Threat Hunting (The Simplified Handbook)
Manual vs. Automated Threat-Hunting in SOC
Forensics and threat hunting | INTERMEDIATE READ
Latest threats | QUICK READ
APT Behind Newly Detected Phishing Campaign Tied to Worldwide Cyberattacks
Access Management | INTERMEDIATE READ
What Is Privilege Escalation? Definition, Types and Examples
Security alerts | QUICK READ
SECURITY ALERT: Heimdal® Identifies Active Phishing Campaign Singleing Out Romanian Telecom Users
Unknown APT Employs Posta Romana as Forefront for Phishing Campaign
Access Management | INTERMEDIATE READ
Cybersecurity Basics | INTERMEDIATE READ
One Platform. Total Security.
Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats