Categories
All things Heimdal
Access Management
Cybersecurity Basics
Cybersecurity interviews
Data security
Endpoint security
Email Security
Financial protection
Forensics and threat hunting
Industry trends
Institutions
Networking
Patch management
Patch Tuesday Updates
Ransomware
Remote Access
Threat center
Security alerts
Latest threats
Vulnerability
How to
Account security
Malware removal
Microsoft Windows
Mobile
Shopping
Social
Cybersecurity News
Resources
Categories
All things Heimdal
Access Management
Cybersecurity Basics
Cybersecurity interviews
Data security
Endpoint security
Email Security
Financial protection
Forensics and threat hunting
Industry trends
Institutions
Networking
Patch management
Patch Tuesday Updates
Ransomware
Remote Access
Threat center
Security alerts
Latest threats
Vulnerability
How to
Account security
Malware removal
Microsoft Windows
Mobile
Shopping
Social
Cybersecurity News
Resources
Cybersecurity Software
Forensics and threat hunting
Forensics and threat hunting updates regarding cyber attacks towards businesses and organizations.
PUBLISHED BY
VLADIMIR UNTERFINGHER
QUICK READ
Top 10 SOAR Tools to Enhance Your SecOps Experience
Read More
PUBLISHED BY
VLADIMIR UNTERFINGHER
INTERMEDIATE READ
From Prey to Predator – A Crash Course in Cyber Threat Hunting
Read More
PUBLISHED BY
VLADIMIR UNTERFINGHER
QUICK READ
Heimdal® Launches Broad Investigation into Russian Cybercrime Trend
Read More
PUBLISHED BY
VLADIMIR UNTERFINGHER
INTERMEDIATE READ
Heimdal®’s XDR Team Links Recent CEO Fraud Attempt to Notorious Turkish Threat Group
Read More
PUBLISHED BY
VLADIMIR UNTERFINGHER
QUICK READ
SOAR vs SIEM. Definitions, Scopes, And Limitations
Read More
PUBLISHED BY
VLADIMIR UNTERFINGHER
QUICK READ
Best 10 SIEM Tools to Fuel Up Your Threat-Hunting Grind
Read More
PUBLISHED BY
VLADIMIR UNTERFINGHER
INTERMEDIATE READ
SIEM vs Log Management – Definitions, Features, Capabilities, and Deployment
Read More
PUBLISHED BY
VLADIMIR UNTERFINGHER
QUICK READ
Heimdal™ Threat Hunting Journal July 2022 Edition
Read More
PUBLISHED BY
VLADIMIR UNTERFINGHER
QUICK READ
Threat Hunting Journal – June 2022 Edition
Read More
PUBLISHED BY
ELENA GEORGESCU
QUICK READ
Open Source Threat Intelligence Platform – Best Alternatives for Your Company [2022]
Read More
PUBLISHED BY
VLADIMIR UNTERFINGHER
QUICK READ
Heimdal™ Security Researchers Discover Massive Surge in DDoS Attacks
Read More
PUBLISHED BY
VLADIMIR UNTERFINGHER
QUICK READ
Threat Hunting Journal May 2022 Edition
Read More
PUBLISHED BY
VLADIMIR UNTERFINGHER
QUICK READ
Threat-Hunting Journal April 2022 – Easter Edition
Read More
PUBLISHED BY
VLADIMIR UNTERFINGHER
QUICK READ
Threat Hunting Journal – March 2022 E.O.M Edition
Read More
PUBLISHED BY
VLADIMIR UNTERFINGHER
QUICK READ
Threat Hunting Journal February 2022 – End of the Month Roundup
Read More
PUBLISHED BY
VLADIMIR UNTERFINGHER
QUICK READ
Heimdal™ Threat Hunting Journal: January E.O.M Edition
Read More
PUBLISHED BY
VLADIMIR UNTERFINGHER
INTERMEDIATE READ
Heimdal™ Security Threat-Hunting Journal: End of the Year Wrap-up in Malware
Read More
PUBLISHED BY
MORTEN KJAERSGAARD
INTERMEDIATE READ
Ramping Up Malware Hunting with Heimdal™
Read More
PUBLISHED BY
MIRIAM CIHODARIU
QUICK READ
DeepBlueMagic Ransomware Strain Discovered by Heimdal™ – New Ransomware, New Method
Read More
PUBLISHED BY
MIRIAM CIHODARIU
QUICK READ
Heimdal™ AI Discovers a Complex Phishing Cryptocurrency Scam Campaign
Read More
PUBLISHED BY
ALINA GEORGIANA PETCU
INTERMEDIATE READ
MegaCortex Ransomware: The Cyber-Threat Looming Over Corporate Networks
Read More
PUBLISHED BY
VLADIMIR UNTERFINGHER
INTERMEDIATE READ
Heimdal™ Security Discovers Gangs Hiding Behind Multiple Domains to Avoid TTPC Detection
Read More
PUBLISHED BY
PAUL CUCU
INTERMEDIATE READ
How to DDoS Like an Ethical Hacker
Read More
PUBLISHED BY
IOANA RIJNETU
QUICK READ
Security Alert: New Spear Phishing Campaign Operated by the MuddyWater Group
Read More
PUBLISHED BY
IOANA RIJNETU
QUICK READ
Security Alert: Malware Hides in Script Injection, Bypassing AV Detection
Read More
PUBLISHED BY
ANA DASCALESCU
QUICK READ
Security Alert: Danish E-Shoppers Targeted by Another Wave of Nets.eu Phishing Campaign
Read More
PUBLISHED BY
ANA DASCALESCU
INTERMEDIATE READ
What Is Cryptojacking And How To Avoid This Attack
Read More
PUBLISHED BY
ANA DASCALESCU
QUICK READ
Coinhive Injections Are An Understated Threat Against Home And Corporate Users
Read More
PUBLISHED BY
PAUL CUCU
SLOW READ
How Every Cyber Attack Works – A Full List
Read More