Categories
All things Heimdal
Access Management
Cybersecurity Basics
Cybersecurity interviews
Data security
Endpoint security
Email Security
Financial protection
Forensics and threat hunting
Industry trends
Institutions
Networking
Patch management
Patch Tuesday Updates
Ransomware
Remote Access
Threat center
Security alerts
Latest threats
Vulnerability
How to
Account security
Malware removal
Microsoft Windows
Mobile
Shopping
Social
Cybersecurity News
Resources
Categories
All things Heimdal
Access Management
Cybersecurity Basics
Cybersecurity interviews
Data security
Endpoint security
Email Security
Financial protection
Forensics and threat hunting
Industry trends
Institutions
Networking
Patch management
Patch Tuesday Updates
Ransomware
Remote Access
Threat center
Security alerts
Latest threats
Vulnerability
How to
Account security
Malware removal
Microsoft Windows
Mobile
Shopping
Social
Cybersecurity News
Resources
Cybersecurity Software
PUBLISHED BY
CRISTIAN NEAGU
QUICK READ
Progress Software Releases Urgent Patches to Fix WS_FTP Server Vulnerabilities
Read More
PUBLISHED BY
LIVIA GYONGYOșI
INTERMEDIATE READ
9 Best Carbon Black Alternatives & Competitors in 2023
Read More
PUBLISHED BY
ANTONIA DIN
INTERMEDIATE READ
12 Benefits of Zero Trust for Mid-Sized Businesses
Read More
PUBLISHED BY
CRISTIAN NEAGU
QUICK READ
Why Organizations Struggle With Vulnerability Management?
Read More
PUBLISHED BY
CRISTIAN NEAGU
QUICK READ
What Is Patch Management as a Service (PMaaS) & What Can It Do For You?
Read More
PUBLISHED BY
GABRIELLA ANTAL
QUICK READ
Heimdal® Achieves ISAE 3000 SOC 2 Type II Certification, Demonstrating Compliance with the Highest Security Standards
Read More
PUBLISHED BY
LIVIA GYONGYOșI
QUICK READ
Sony`s Systems Breached. Ransomed.vc Claims Stealing 260 GB of Data
Read More
PUBLISHED BY
ALINA GEORGIANA PETCU
INTERMEDIATE READ
Phobos Ransomware: Everything You Need to Know and More
Read More
PUBLISHED BY
MADALINA POPOVICI
QUICK READ
NY College Must Spend $3.5M on Cybersecurity After Breach Affecting 200k Students
Read More
PUBLISHED BY
GABRIELLA ANTAL
INTERMEDIATE READ
7 Best Sophos Alternatives & Competitors in 2023 [Features, Pricing & Reviews]
Read More
PUBLISHED BY
CRISTIAN NEAGU
QUICK READ
Apple Fixes 3 New Actively Exploited Zero-Day Vulnerabilities
Read More
PUBLISHED BY
CRISTIAN NEAGU
QUICK READ
New Threat Group: Sandman Targets Telecommunication Companies Across the World With Infostealers
Read More
PUBLISHED BY
ANDREEA CHEBAC
INTERMEDIATE READ
Computer Security Incident Response Team (CSIRT): How to Build One
Read More
PUBLISHED BY
LIVIA GYONGYOșI
QUICK READ
International Criminal Court Reveals System Breach and Plans to Bolster Security
Read More
PUBLISHED BY
LIVIA GYONGYOșI
QUICK READ
Critical GitLab Pipeline Vulnerability Revealed. Users are urged to patch immediately
Read More
PUBLISHED BY
LIVIA GYONGYOșI
QUICK READ
Improper Usage of SAS Token Leads to Massive Microsoft Data Leakage
Read More
PUBLISHED BY
LIVIA GYONGYOșI
INTERMEDIATE READ
What Is Nmap and How to Use It to Enhance Network Security
Read More
PUBLISHED BY
ANDREEA CHEBAC
QUICK READ
Cryptocurrency Scams to Heavily Target TikTok Users
Read More
PUBLISHED BY
ANDREEA CHEBAC
QUICK READ
EDR for Banking: 6 Ways EDR Can Help Financial Organizations
Read More
PUBLISHED BY
MADALINA POPOVICI
INTERMEDIATE READ
Best Practices for Endpoint Security in Healthcare Institutions
Read More
PUBLISHED BY
LIVIA GYONGYOșI
INTERMEDIATE READ
How DNS Layer Security Stops Ransomware and Other Cyberattacks
Read More
PUBLISHED BY
MADALINA POPOVICI
INTERMEDIATE READ
Top 10 Healthcare Data Breaches [2022-2023]
Read More
PUBLISHED BY
CRISTIAN NEAGU
QUICK READ
Two New York Hospitals Breached by the LockBit Ransomware Group
Read More
PUBLISHED BY
GABRIELLA ANTAL
INTERMEDIATE READ
What Effect Does Firm Size Have on Ransomware Threats?
Read More
PUBLISHED BY
LIVIA GYONGYOșI
QUICK READ
5 Examples of DNS IoCs That Are Red Flags for Cyberattacks
Read More
PUBLISHED BY
ANTONIA DIN
INTERMEDIATE READ
Companies Affected by Ransomware [Updated 2023]
Read More
PUBLISHED BY
ANDREEA CHEBAC
INTERMEDIATE READ
Banking Cybersecurity: The Risks Faced by Financial Institutions
Read More
PUBLISHED BY
LIVIA GYONGYOșI
QUICK READ
How to Use DNS IoCs to Prevent Ransomware Attacks
Read More
PUBLISHED BY
LIVIA GYONGYOșI
QUICK READ
GitHub Vulnerability Exposes Over 4,000 Repositories to Repojacking Attacks
Read More
PUBLISHED BY
LIVIA GYONGYOșI
QUICK READ
Microsoft Teams Phishing Attacks: Ransomware Group Shifts Tactics
Read More
1
2
3
…
110