Heimdal
Latest Articles

Forensics and threat hunting

Forensics and threat hunting | INTERMEDIATE READ

Nordic Users Targeted by National Danish Police Phishing Attack

Victims Cited to Court over Fake Infantile Cyberpornography Allegations.

Forensics and threat hunting | INTERMEDIATE READ

Dark Power Ransomware Abusing Vulnerable Dynamic-Link Libraries in Resolved API Flow

An Ongoing Investigation into Emergent Cryptolocking Ransomware Strain.

Cybersecurity Basics | INTERMEDIATE READ

Cyber Threat Hunting vs Incident Response: What's the Difference?

Learn Which Approach Is Best for Your Organization.

Forensics and threat hunting | INTERMEDIATE READ

Stay Ahead of Cyberthreats with Proactive Threat Hunting

What Is Proactive Threat Hunting and Why Do You Need It in Your Cybersecurity Strategy?

Forensics and threat hunting | QUICK READ

Heimdal® Launches Broad Investigation into Russian Cybercrime Trend

Russian Cybercrime Phenomenon Skyrockets Amidst Ongoing European Conflict.

Forensics and threat hunting | INTERMEDIATE READ

SIEM vs Log Management – Definitions, Features, Capabilities, and Deployment

SIEM and Log Management in Threat-Hunting and Incident Response.

Forensics and threat hunting | QUICK READ

Threat Hunting Journal – June 2022 Edition

Heimdal™ Security Monthly Malware Roundup

Forensics and threat hunting | QUICK READ

Open Source Threat Intelligence Platform - Best Alternatives for Your Company [2024]

Top 7 Open Source Threat Intelligence Platforms that Provide Real-time Updates on Global and Internal Security Threats.

Forensics and threat hunting | QUICK READ

Threat Hunting Journal May 2022 Edition

Top Malware(s) Detections: 1st of May – 27th of May

Forensics and threat hunting | QUICK READ

Threat-Hunting Journal April 2022 – Easter Edition

Top Malware(s) Detections: 1st of April – 28th of April

Forensics and threat hunting | QUICK READ

Threat Hunting Journal – March 2022 E.O.M Edition

Top Malware(s) Detection: 1st of March – 28th of March

Forensics and threat hunting | QUICK READ

Threat Hunting Journal February 2022 – End of the Month Roundup

Top Malware(s) Detection: 1st of February – 28th of February

Forensics and threat hunting | QUICK READ

Heimdal™ Threat Hunting Journal: January E.O.M Edition

Top Malware(s) Detection: 1st of January – 31st of January

All things Heimdal | INTERMEDIATE READ

Heimdal™ Security Threat-Hunting Journal: End of the Year Wrap-up in Malware

Top 20 Malware(s) Detection: November 1st – January 1st, 2022

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats