Heimdal
Latest Articles

Vulnerability

Cybersecurity News | QUICK READ

Jupiter Plugin Vulnerabilities Enable Hackers to Hijack Websites

WordPress Security Researchers Found Vulnerabilities Allowing Privilege Escalation.

Cybersecurity News | QUICK READ

Top Exploited Vulnerabilities in 2021 Revealed by Cybersecurity Firms

15 Common Flaws of Last Year Now Put Together in a List.

Networking | INTERMEDIATE READ

10 Common Network Vulnerabilities and How to Prevent Them

From Exposed IoT Devices and Misconfigured Firewalls to Outdated Software.

Cybersecurity Basics | INTERMEDIATE READ

What Is Risk-Based Vulnerability Management?

How It Works: Defining the RBVM Process. Find Out How It Is Different from Legacy Vulnerability Management.

Patch management | INTERMEDIATE READ

Software Patching Statistics: Common Practices and Vulnerabilities

How Often and Fast Do Companies Really Apply Updates? How Dangerous (or Not) Are the Common Software Patching Behaviors?

Cybersecurity News | QUICK READ

The Log4j Vulnerability Is Now Used by State-Backed Hackers

The Threat Actors Are Linked to Governments in China, Iran, North Korea, and Turkey.

Cybersecurity News | INTERMEDIATE READ

A List of Vulnerable Products to the Log4j Vulnerability

Details on What Vendor Products Are Impacted by This Flaw.

Vulnerability | QUICK READ

Most Dangerous Hardware Vulnerabilities in 2021

A List of the Most Harmful Hardware Weaknesses Has Been Provided by the American Not-for-profit Organization MITRE.

Cybersecurity News | QUICK READ

A New Zero-day Vulnerability Is Impacting All Windows Versions

A New LPE Zero-day Vulnerability Was Recently Discovered.

Ransomware | QUICK READ

Experts Make Out a List of Vulnerabilities Abused by Ransomware Groups

Since Ransomware Has Taken Ground Recently, Organizations Must Be Aware Which Vulnerabilities Were or Are Being Exploited.

Cybersecurity Basics | INTERMEDIATE READ

Defining Zero-Day Vulnerability

All About How You Can Protect Your Business from a Zero-Day Attack

Cybersecurity News | QUICK READ

On Average, It Takes 205 Days to Patch Up Severe Cybersecurity Vulnerabilities, a New Study Shows

Specialists Have Discovered that Businesses in the Utility Sector Had the Highest Exposure Window With their Application Vulnerabilities.

Cybersecurity News | QUICK READ

Bluetooth Vulnerabilities Allow Impersonation Attacks on Devices

Researchers Discovered that the Security Bugs Are Affecting the Bluetooth Core and Mesh Profile Specifications.

All things Heimdal | QUICK READ

Heimdal™ Releases Vulnerability Data on the Microsoft Exchange Patch

Over 85%* of organizations have already patched their systems

Microsoft Windows | INTERMEDIATE READ

Windows Defender Vulnerabilities: How the Latest Malware Can Disable It

Trickbot and its sneaky ways of disabling Windows Defender without your knowledge. Why you can’t rely on system defenses alone.

Data security | INTERMEDIATE READ

How Flash Vulnerabilities Expose You To Attacks

It’s time you learnt how to live without Flash and its security risks

Vulnerability | SLOW READ

Why Java Vulnerabilities Are One of Your Biggest Security Problems

This software used by millions is one of the key targets for cyber criminals

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats