Heimdal
Latest Articles

Forensics and threat hunting

Cybersecurity Basics | INTERMEDIATE READ

Cyber Threat Hunting vs Incident Response: What's the Difference?

Learn Which Approach Is Best for Your Organization.

Forensics and threat hunting | INTERMEDIATE READ

Stay Ahead of Cyberthreats with Proactive Threat Hunting

What Is Proactive Threat Hunting and Why Do You Need It in Your Cybersecurity Strategy?

Forensics and threat hunting | QUICK READ

SOAR vs SIEM - Definitions and Key Differences

Pros and Cons in SIEM and SOAR Combinations

Forensics and threat hunting | INTERMEDIATE READ

SIEM vs Log Management – Definitions, Features, Capabilities, and Deployment

SIEM and Log Management in Threat-Hunting and Incident Response.

Forensics and threat hunting | QUICK READ

Threat Hunting Journal – June 2022 Edition

Heimdal™ Security Monthly Malware Roundup

Forensics and threat hunting | QUICK READ

Open Source Threat Intelligence Platform - Best Alternatives for Your Company [2026]

Top 7 Open Source Threat Intelligence Platforms that Provide Real-time Updates on Global and Internal Security Threats.

Advanced malware researches | INTERMEDIATE READ

What Is Cryptojacking And How To Avoid This Attack

Find out what blockchain is, why criminals want Monero coins and how to keep safe from cryptojacking

Account security | SLOW READ

How Every Cyber Attack Works - A Full List

Which of these cyber attacks will hack you?

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats