Security alerts | QUICK READ
SECURITY ALERT: Heimdal® Responds to CEO Fraud Attempt Launched by Unknown Perpetrator
Fraud Attempt Employed State-of-the-Art Social Engineering Tactics.
Forensics and threat hunting | QUICK READ
Best 10 SIEM Tools to Fuel Up Your Threat-Hunting Grind
SIEM Solutions for A to Z Threat-Hunting.
Forensics and threat hunting | INTERMEDIATE READ
SIEM vs Log Management – Definitions, Features, Capabilities, and Deployment
SIEM and Log Management in Threat-Hunting and Incident Response.
Data security | INTERMEDIATE READ
Patch management | INTERMEDIATE READ
What is Cyber-Essential Patch Compliance?
Patch Compliance in Automatic Patch Management.
Forensics and threat hunting | QUICK READ
Heimdal™ Threat Hunting Journal July 2022 Edition
Latest in Heimdal™ Malware Detections
Cybersecurity News | QUICK READ
FileWave MDM Vulnerabilities Leave 1000+ Organizations Exposed to Remote Cyberattacks
Vulnerabilities Granted Threat Actors Super User Privileges
Cybersecurity News | QUICK READ
Amadey Bot Makes Roaring Comeback with Aid from SmokeLoader Malware
SmokeLoader Drops Amadey Bot via Keygens and Software Cracks
Cybersecurity News | QUICK READ
New Redeemer Ransomware Design Spotted on Hacker Forums
Redeemer Ransomware Creator Demanding Profit Cut
Networking | SLOW READ
OSI Layers Explained – The “What”, “Where”, and “Why” of the OSI Model.
OSI Model in Computer Networking
Networking | SLOW READ
On the Anatomy of a DNS Attack – Types, Technical Capabilities, and Mitigation
DNS Attacks Come in Quite a Few Shapes and Sizes. Here Is Everything You Need to Know.
Vulnerability | QUICK READ
What is a Security Content Automation Protocol (SCAP)?
Definition, Specifications, and Applicability
One Platform. Total Security.
Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats