Heimdal
Latest Articles

Forensics and threat hunting

Forensics and threat hunting | INTERMEDIATE READ

Nordic Users Targeted by National Danish Police Phishing Attack

Victims Cited to Court over Fake Infantile Cyberpornography Allegations.

Forensics and threat hunting | INTERMEDIATE READ

Dark Power Ransomware Abusing Vulnerable Dynamic-Link Libraries in Resolved API Flow

An Ongoing Investigation into Emergent Cryptolocking Ransomware Strain.

Cybersecurity Basics | INTERMEDIATE READ

Cyber Threat Hunting vs Incident Response: What's the Difference?

Learn Which Approach Is Best for Your Organization.

Forensics and threat hunting | INTERMEDIATE READ

Stay Ahead of Cyberthreats with Proactive Threat Hunting

What Is Proactive Threat Hunting and Why Do You Need It in Your Cybersecurity Strategy?

Forensics and threat hunting | QUICK READ

Top 10 SOAR Tools to Enhance Your SecOps Experience

Best Open-Source SOAR Tools For Faster Setups.

Forensics and threat hunting | QUICK READ

Heimdal® Launches Broad Investigation into Russian Cybercrime Trend

Russian Cybercrime Phenomenon Skyrockets Amidst Ongoing European Conflict.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats