Networking | SLOW READ
OSI Layers Explained – The “What”, “Where”, and “Why” of the OSI Model.
OSI Model in Computer Networking
Cybersecurity Basics | SLOW READ
DNS Attack Types Explained - Threats and Mitigation Measures
All You Need to Know About DNS Attacks
Vulnerability | INTERMEDIATE READ
What is a Security Content Automation Protocol (SCAP)?
Definition, Specifications, and Applicability
Patch management | INTERMEDIATE READ
How Many ‘Fixes’ Are There?
Forensics and threat hunting | QUICK READ
Threat Hunting Journal – June 2022 Edition
Heimdal™ Security Monthly Malware Roundup
Cybersecurity News | QUICK READ
ANAF Spearphishing Campaign Zeroes in on Romanian Businesses
Users Urged to Pay Out Outstanding Taxes
Patch management | INTERMEDIATE READ
What is a Hotfix? Definition, Challenges, and Best Practices
Hotfix Lifecycle Management
Forensics and threat hunting | QUICK READ
Heimdal™ Security Researchers Discover Massive Surge in DDoS Attacks
Countering DDoS Attacks and Mitigating After-Effects
Networking | INTERMEDIATE READ
10 Paid and Open-Source Vulnerability Management Tools
How to Seek and Fix Security Gaps
Security alerts | QUICK READ
What is CVE-2022-30190? Workarounds and Cybersecurity Advice.
Email Security | SLOW READ
What is PGP Encryption and How does it Work?
Factoring the PGP Encryption Algorithm. Applications of PGP in Email Communication.
Forensics and threat hunting | QUICK READ
Threat Hunting Journal May 2022 Edition
Top Malware(s) Detections: 1st of May – 27th of May
Cybersecurity Basics | INTERMEDIATE READ
What is Security Orchestration Automation and Response?
Cybersecurity News | QUICK READ
NIST Releases Advisory Guide on Supply Chain Attack Protection
NIST’s New Recommendations on Supply Chain Attack Prevention
Cybersecurity News | QUICK READ
Chinese State-Sponsored APT Naikon Resurfaces with New Tactics, Techniques, and Procedures (TTPs).
Naikon M.O. and TTPs
Security alerts | QUICK READ
Botnet StealthWorker – M.O, Infectious Mechanism(s), and Distribution.
Forensics and threat hunting | QUICK READ
Threat-Hunting Journal April 2022 – Easter Edition
Top Malware(s) Detections: 1st of April – 28th of April
Cybersecurity News | QUICK READ
JupyterLab’s Web Notebooks Hit Clipped Emergent Python-based Ransomware Strain
Nameless Malware ‘Honeypotted’ After the Attack
Forensics and threat hunting | QUICK READ
Threat Hunting Journal – March 2022 E.O.M Edition
Top Malware(s) Detection: 1st of March – 28th of March
Cybersecurity Basics | INTERMEDIATE READ
What Is FOSS Software? Definition, Usage, and Vulnerabilities
FOSS (Free Open-Source Software) vs. OSS (Open-Source Software) vs. CSS (Closed-Source Software)
Patch management | QUICK READ
Heimdal™ Security Rolls Out Patch & Asset Management for Linux Systems
Patch & Asset Management for Linux at a Glance. Unified Patch Management.
Forensics and threat hunting | QUICK READ
Threat Hunting Journal February 2022 – End of the Month Roundup
Top Malware(s) Detection: 1st of February – 28th of February
Account security | INTERMEDIATE READ
How to Create a New User on Mac
Account creation on Mac made easy
Endpoint security | INTERMEDIATE READ
Microsoft to Disable Autorun MOTW Macros – End of an Era for Macro Malware or Hard Reset?
Macro Malware to Fade Out Following Microsoft’s Change?
Forensics and threat hunting | QUICK READ
Heimdal™ Threat Hunting Journal: January E.O.M Edition
Top Malware(s) Detection: 1st of January – 31st of January
All things Heimdal | INTERMEDIATE READ
Heimdal™ Security Threat-Hunting Journal: End of the Year Wrap-up in Malware
Top 20 Malware(s) Detection: November 1st – January 1st, 2022
Social | INTERMEDIATE READ
All You Need to Know About Black Friday Scams: How to Recognize Them and Stay Safe
Most (Un)common Black Friday Scams.
One Platform. Total Security.
Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats