Heimdal
Latest Articles

Search Results: malware

Here are the guides and articles we found according to your search.

1569 results for "malware"

Patch management | QUICK READ

SECURITY ALERT: Microsoft released emergency fixes for 4 Zero-Days in Exchange

For the time being, the attacks are limited, but as more malicious actors become aware of them, they may accelerate.

Industry trends | INTERMEDIATE READ

Banking and Insurance Cybersecurity in 2021: Threats and Considerations

The Main Facts and Figures of Cybersecurity for Banks and Insurance. Building a Cybersecurity Strategy for the Financial Sector.

Patch management | QUICK READ

What Is a Software Patch?

Software Patch Definition and How It Works. Find Out All You Need to Know about Software Patches.

Email Security | INTERMEDIATE READ

We Have Debunked 5 Myths About Email Security

Conceptions and Misconceptions about Email Security

Account security | INTERMEDIATE READ

 Is Bitcoin Safe? Things to Consider Before Investing

Cryptocurrency Cybersecurity Concerns. Securing Your Bitcoin Trade.

Cybersecurity Basics | INTERMEDIATE READ

Everything You Need to Know About Defense in Depth Layers

Several Layers Are Involved in a Defense in Depth Cybersecurity Strategy. Here’s What You Need to Know About Them.

Account security | INTERMEDIATE READ

Is BlueStacks Safe? Addressing Cybersecurity Concerns of Android Emulation Software

BlueStacks for Enterprise – Known Security Issues and Workarounds

Data security | INTERMEDIATE READ

Have You Ever Installed a Malicious Chrome Extension?

Malicious Chrome Extensions Pose Real Danger to Your Data and Devices. Find Out Why and How to Stay Safe.

Account security | INTERMEDIATE READ

How Can You Avoid Downloading Malicious Code? Security Tips to Consider

Malicious Code Hides in Plain Sight. Learn How to Keep It Out of Your Network.

Cybersecurity Basics | QUICK READ

What Can Malicious Code Do? A Brief Overview of Common Cyberattacks

Malicious Code is the Foundation of Most Cyberattacks. Do You Know How to Spot It?

Account security | INTERMEDIATE READ

How to Encrypt an Email in Outlook

Outlook Email Encryption with OME and S\MIME. Email Encryption. Best Practices.

Data security | QUICK READ

Did You Know That There Are Various Types of Online Financial Frauds Lurking in the Cyberspace?

Malicious Actors Love Online Financial Frauds. Make Sure You Know What They Are and How to Prevent Them!

Cybersecurity Basics | INTERMEDIATE READ

7 Malicious Code Examples to Be Aware of and Prevent

Malicious Code Comes in Many Shapes and Sizes. Here’s What You Should Know About It.

Cybersecurity Basics | QUICK READ

What is a Malicious App and How to Spot One?

Malicious App Definition. Blacklisting and Whitelisting Apps. Protecting Your Assets against Malicious Apps

Advanced malware researches | INTERMEDIATE READ

MegaCortex Ransomware: The Cyber-Threat Looming Over Corporate Networks

MegaCortex Ransomware Has Been Targeting Businesses Since January 2019. Learn How to Protect Your Enterprise from It.

Institutions | QUICK READ

The DCH Ransomware Attack: A Teachable Moment in Cyber-History

An Extensive Ransomware Attack Hit Alabama’s DCH Health System in 2019. Here’s What You Can Learn from It.

Ransomware | INTERMEDIATE READ

SamSam Ransomware 101: How It Works and How to Avoid It

SamSam Ransomware Was Released in Late 2015. Here’s What You Should Know About It.

Cybersecurity Basics | INTERMEDIATE READ

What Is a Crypto Virus and How Does It Work?

Crypto Virus vs Ransomware: Are They Different? Learn How to Protect Your Company from Any Crypto Virus and Ransomware!

All things Heimdal | QUICK READ

Heimdal is the Winner of the Anti-Advanced Persistent Threat (APT) Solution of the Year Award

A big thank you to everyone who has shown their support! Anti-Advanced Persistent Threat (APT) Solution of the Year 2020

Data security | SLOW READ

The 15 Internet Crime Stories That Make Cybersecurity Measures Essential

Read the best, most fascinating tech stories that cover the risks of the digital landscape and find out how to stay safe

Account security | INTERMEDIATE READ

Is AliExpress Safe? The Answer Might Surprise You

Find Out More About AliExpress’s History and Buyer Protection Policy. Learn How to Shop Safely!

Shopping | SLOW READ

Cyber Monday Shopping Guide: Essential Cybersecurity Tips

Cyber Monday Is the Most Prolific Shopping Day of the Year. Are Your Finances Properly Secured?

Security alerts | QUICK READ

SECURITY ALERT: Zoom Video Phishing Emails Targeting Corporate HVTs (UPDATED)

Zoom Video Used in Phishing Campaign. Protecting Your Assets against Phishing Attempts.

Account security | INTERMEDIATE READ

Is Airbnb Safe?

An Overview on Airbnb Travel Cybersecurity Concerns. Learn How To Use Airbnb Safely As a Guest and As a Host!

Endpoint security | SLOW READ

What Is EPDR (Endpoint Prevention, Detection and Response)?

How EPDR Is the New Groundbreaking Golden Standard. Why Your Organization Should Adopt a Proactive Approach to Cybersecurity.

How to | INTERMEDIATE READ

Netiquette Rules: Definition and 10 Basic Rules To Dramatically Improve your Safety

These basic cybersecurity guidelines will keep you safe in most situations

Institutions | INTERMEDIATE READ

Operation Tovar: What It Was and How A Key Botnet Was Eliminated

How Heimdal Security took part in the global effort against the Gameover Zeus Botnet and CryptoLocker ransomware

Ransomware | SLOW READ

The Picture of a Modern-day Highwayman – RobbinHood Ransomware

Breakdown of RobbinHood Ransomware – Attack Patterns, Infiltration, and Obfuscation

Security alerts | QUICK READ

SECURITY ALERT: Heimdal™ Puts out an APB on Russian Hackers Responsible for Danish Reseller Attack

Danish reseller attacks successfully thwarted by Heimdal™ Security

Ransomware | INTERMEDIATE READ

WannaCry Ransomware Explained

How one of the most dangerous ransomware outbursts happened. Key lessons organizations should learn.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats