Forensics and threat hunting | INTERMEDIATE READ
Nordic Users Targeted by National Danish Police Phishing Attack
Victims Cited to Court over Fake Infantile Cyberpornography Allegations.
Forensics and threat hunting | INTERMEDIATE READ
Dark Power Ransomware Abusing Vulnerable Dynamic-Link Libraries in Resolved API Flow
An Ongoing Investigation into Emergent Cryptolocking Ransomware Strain.
Forensics and threat hunting | INTERMEDIATE READ
Dark Power Ransomware on the Ascent – A Technical Insight into 2023’s Latest Ransomware Strain
Dissecting the NIM-Written Dark Power Ransomware.
Cybersecurity Basics | INTERMEDIATE READ
Cyber Threat Hunting vs Incident Response: What's the Difference?
Learn Which Approach Is Best for Your Organization.
Forensics and threat hunting | QUICK READ
Consolidating Your Security Operations with Automated Threat Hunting (The Simplified Handbook)
Manual vs. Automated Threat-Hunting in SOC
Forensics and threat hunting | INTERMEDIATE READ
Forensics and threat hunting | INTERMEDIATE READ
Stay Ahead of Cyberthreats with Proactive Threat Hunting
What Is Proactive Threat Hunting and Why Do You Need It in Your Cybersecurity Strategy?
Forensics and threat hunting | QUICK READ
Designing Your Threat Hunting Framework from Scratch – Core Essentials
What Is a Threat Hunting Framework?
Forensics and threat hunting | INTERMEDIATE READ
Top 10+ SOAR Tools to Enhance Your SecOps Experience
Best Open-Source SOAR Tools.
Forensics and threat hunting | QUICK READ
Heimdal® Launches Broad Investigation into Russian Cybercrime Trend
Russian Cybercrime Phenomenon Skyrockets Amidst Ongoing European Conflict.
Forensics and threat hunting | INTERMEDIATE READ
Heimdal®’s XDR Team Links Recent CEO Fraud Attempt to Notorious Turkish Threat Group
All Clues Point Towards Cobalt Terrapin Threat Group.
Forensics and threat hunting | QUICK READ
SOAR vs SIEM. Definitions, Scopes, And Limitations
Pros and Cons in SIEM/SOAR Combinations.
Forensics and threat hunting | QUICK READ
Best 10 SIEM Tools to Fuel Up Your Threat-Hunting Grind
SIEM Solutions for A to Z Threat-Hunting.
Forensics and threat hunting | INTERMEDIATE READ
SIEM vs Log Management – Definitions, Features, Capabilities, and Deployment
SIEM and Log Management in Threat-Hunting and Incident Response.
Forensics and threat hunting | QUICK READ
Heimdal™ Threat Hunting Journal July 2022 Edition
Latest in Heimdal™ Malware Detections
Forensics and threat hunting | QUICK READ
Threat Hunting Journal – June 2022 Edition
Heimdal™ Security Monthly Malware Roundup
Forensics and threat hunting | QUICK READ
Open Source Threat Intelligence Platform - Best Alternatives for Your Company [2024]
Top 7 Open Source Threat Intelligence Platforms that Provide Real-time Updates on Global and Internal Security Threats.
Forensics and threat hunting | QUICK READ
Heimdal™ Security Researchers Discover Massive Surge in DDoS Attacks
Countering DDoS Attacks and Mitigating After-Effects
Forensics and threat hunting | QUICK READ
Threat Hunting Journal May 2022 Edition
Top Malware(s) Detections: 1st of May – 27th of May
Forensics and threat hunting | QUICK READ
Threat-Hunting Journal April 2022 – Easter Edition
Top Malware(s) Detections: 1st of April – 28th of April
Forensics and threat hunting | QUICK READ
Threat Hunting Journal – March 2022 E.O.M Edition
Top Malware(s) Detection: 1st of March – 28th of March
Forensics and threat hunting | QUICK READ
Threat Hunting Journal February 2022 – End of the Month Roundup
Top Malware(s) Detection: 1st of February – 28th of February
Forensics and threat hunting | QUICK READ
Heimdal™ Threat Hunting Journal: January E.O.M Edition
Top Malware(s) Detection: 1st of January – 31st of January
All things Heimdal | INTERMEDIATE READ
Heimdal™ Security Threat-Hunting Journal: End of the Year Wrap-up in Malware
Top 20 Malware(s) Detection: November 1st – January 1st, 2022
Forensics and threat hunting | INTERMEDIATE READ
Forensics and threat hunting | QUICK READ
DeepBlueMagic Ransomware Strain Discovered by Heimdal™ - New Ransomware, New Method
DeepBlueMagic, the New Ransomware on the Horizon. How the Strain Works.
One Platform. Total Security.
Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats