Heimdal
Latest Articles

News

News | QUICK READ

60GB of User Data Was Exposed by Australian Trading Company ACY Securities

A Representative of the Trading Giant Declared that the Exposed Server Was an “Insignificant One.”

News | QUICK READ

Industrial Spy Is Now Targeting Corporate Websites to Display Ransom Notes

The Attackers Threaten to Sell the Victims’ Stolen Data on Their Tor Marketplace if They Fail to Pay the Ransom.

News | QUICK READ

New RuneScape Phishing Scam Aimed at Stealing Accounts and In-game Item Bank PINs

The Phishing Operation Sends a Bogus Email Update Notice to Old School and Standard Gamers to Steal Personal Information.

News | QUICK READ

10K Followers on LinkedIn and Heimdal™’s LinkedIn Giveaway

We have recently reached 10k followers on LinkedIn. We want to give you something back!

News | QUICK READ

Threat Hunting Journal May 2022 Edition

Top Malware(s) Detections: 1st of May – 27th of May

News | QUICK READ

New Ransomware Variant Dubbed ‘Cheers’ Discovered

The Linux-based Ransomware Variant Is Compromising ESXi Servers.

News | QUICK READ

GM Credential Stuffing Attack Reveals Automobile Owners' Details

The Attack Exposed User Information and Allowed Hackers to Cash Rewards Points for Gift Cards.

News | QUICK READ

Deep Fakes of Elon Musk Promote BitVex Fraud

Scammers Are Using Bogus Elon Musk Videos to Promote a BitVex Trading Platform Fraud that Takes Deposited Money.

News | QUICK READ

500,000 Chicago Students' Data Exposed in Ransomware Attack

Battelle for Kids, Chicago Public Schools’ Vendor Experienced a Ransomware Attack.

News | QUICK READ

Conti Ransomware Shuts Down and Rebrands Itself

Despite Dropping the Conti Name, the Criminal Group Will Remain a Major Player in the Ransomware Landscape.

News | QUICK READ

Ransomware Hits Media Giant Nikkei’s Asian Unit

Hackers Gained Unauthorized Access to the Company’s Server.

News | QUICK READ

Millions of Cyberattacks Are Targeting Tatsu WordPress Plugin

Hackers Are Leveraging CVE-2021-25094, a Remote Code Execution Vulnerability.

News | QUICK READ

Top 10 Attack Vectors Most Exploited by Hackers Revealed

A Joint Advisory Describes Most Preferred Initial Access Attack Vectors by Threat Actors.

News | QUICK READ

Malicious PHP Code Used to Steal Banking Information, FBI Said

What Are the FBI’s Recommended Mitigations?

News | QUICK READ

'Thanos' Ransomware Builder Was Designed by a Physician

A French-Venezuelan Doctor Allegedly Created “Thanos” Ransomware and Other Cybercriminal Tools.

News | QUICK READ

NerbianRAT Trojan Spreads via Emails

Written in GO, the Malware Can Bypass Detection and Analysis.

News | QUICK READ

Phishing Threat Actors Still Fond of HTML Attachments

Here’s an Important Thing You Need to Know about HTML Attachments that Might Save You a Lot of Trouble.

News | QUICK READ

Business Email Security Contributes to Business Stability

Here’s Everything to Know About Business Email Security.

News | QUICK READ

Cybercriminals Launch a New Malware-as-a-Service: the 'Eternity Project'

Hackers Can Choose Between an Info-stealer, a Miner, a Worm Spreader, or Ransomware Tools. Or They Can Get Them All!

News | QUICK READ

BPFdoor Has the Capacity to Bypass Firewalls

A New Linux Malware Has Been Discovered That Shows Anti-Evasion Techniques.

News | QUICK READ

WordPress Websites Files and Databases Injected with Malicious JavaScript

The Malicious Campaign Allowed the Attacker the Ability to Redirect the Website Users to a Location of Their Choosing.

News | QUICK READ

South Asian Governments Targeted by Bitter APT Group

Based on Two Infection Chains, the Campaign Employes Malware with Remote File Execution Capabilities.

News | QUICK READ

Nerbian RAT Malware, New Threat on the Market

The New Remote Access Trojan Spreads Using COVID-19 and World Health Organization Themes.

News | QUICK READ

New Phishing-as-a-Service Toolkit Discovered

Cybercriminals May Use Frappo to Attack Major Financial Institutions and Online Retailers.

News | QUICK READ

Don’t Underestimate the DCRat Malware!

Despite Its Low Cost, the Malware Has a Wide Range of Capabilities.

News | INTERMEDIATE READ

Vendor Email Compromise (VEC) Explained

Definition, How VEC Attacks Work and Protective Measures.

News | QUICK READ

Transport for NSW Suffers Cyber Incident

Its Online Authorised Inspection Scheme Application Was Accessed by an Unauthorised Third Party.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats