• Categories
    • All things Heimdal
    • Access Management
    • Cybersecurity Basics
    • Cybersecurity interviews
    • Data security
    • Endpoint security
    • Email Security
    • Financial protection
    • Forensics and threat hunting
    • Industry trends
    • Institutions
    • Networking
    • Patch management
    • Patch Tuesday Updates
    • Ransomware
    • Remote Access
    • Threat center
      • Security alerts
      • Latest threats
    • Vulnerability
  • How to
    • Account security
    • Malware removal
    • Microsoft Windows
    • Mobile
    • Shopping
    • Social
  • Cybersecurity News
  • Resources
Heimdal Security
  • Categories
    • All things Heimdal
    • Access Management
    • Cybersecurity Basics
    • Cybersecurity interviews
    • Data security
    • Endpoint security
    • Email Security
    • Financial protection
    • Forensics and threat hunting
    • Industry trends
    • Institutions
    • Networking
    • Patch management
    • Patch Tuesday Updates
    • Ransomware
    • Remote Access
    • Threat center
      • Security alerts
      • Latest threats
    • Vulnerability
  • How to
    • Account security
    • Malware removal
    • Microsoft Windows
    • Mobile
    • Shopping
    • Social
  • Cybersecurity News
  • Resources
  • Cybersecurity Software
progress software vulnerabilities
PUBLISHED BY CRISTIAN NEAGU QUICK READ

Progress Software Releases Urgent Patches to Fix WS_FTP Server Vulnerabilities

Read More
carbon black alternatives (2)
PUBLISHED BY LIVIA GYONGYOșI INTERMEDIATE READ

9 Best Carbon Black Alternatives & Competitors in 2023

Read More
benefits of zero trust for mid-sized businesses
PUBLISHED BY ANTONIA DIN INTERMEDIATE READ

12 Benefits of Zero Trust for Mid-Sized Businesses

Read More
vulnerability management challenges
PUBLISHED BY CRISTIAN NEAGU QUICK READ

Why Organizations Struggle With Vulnerability Management?

Read More
patch management as a service 1
PUBLISHED BY CRISTIAN NEAGU QUICK READ

What Is Patch Management as a Service (PMaaS) & What Can It Do For You?

Read More
PUBLISHED BY GABRIELLA ANTAL QUICK READ

Heimdal® Achieves ISAE 3000 SOC 2 Type II Certification, Demonstrating Compliance with the Highest Security Standards

Read More
sony data breach
PUBLISHED BY LIVIA GYONGYOșI QUICK READ

Sony`s Systems Breached. Ransomed.vc Claims Stealing 260 GB of Data

Read More
Phobos ransomware cover image
PUBLISHED BY ALINA GEORGIANA PETCU INTERMEDIATE READ

Phobos Ransomware: Everything You Need to Know and More

Read More
Manhattan, Central Park, New York
PUBLISHED BY MADALINA POPOVICI QUICK READ

NY College Must Spend $3.5M on Cybersecurity After Breach Affecting 200k Students

Read More
sophos alternatives
PUBLISHED BY GABRIELLA ANTAL INTERMEDIATE READ

7 Best Sophos Alternatives & Competitors in 2023 [Features, Pricing & Reviews]

Read More
apple zero day vulnerability
PUBLISHED BY CRISTIAN NEAGU QUICK READ

Apple Fixes 3 New Actively Exploited Zero-Day Vulnerabilities

Read More
sandman threat group
PUBLISHED BY CRISTIAN NEAGU QUICK READ

New Threat Group: Sandman Targets Telecommunication Companies Across the World With Infostealers

Read More
hands on a keyboard with a black background
PUBLISHED BY ANDREEA CHEBAC INTERMEDIATE READ

Computer Security Incident Response Team (CSIRT): How to Build One

Read More
ICC system breach (2)
PUBLISHED BY LIVIA GYONGYOșI QUICK READ

International Criminal Court Reveals System Breach and Plans to Bolster Security

Read More
gitlab pipeline vulnerability
PUBLISHED BY LIVIA GYONGYOșI QUICK READ

Critical GitLab Pipeline Vulnerability Revealed. Users are urged to patch immediately

Read More
microsoft data leakage
PUBLISHED BY LIVIA GYONGYOșI QUICK READ

Improper Usage of SAS Token Leads to Massive Microsoft Data Leakage

Read More
how to use nmap in network security (4)
PUBLISHED BY LIVIA GYONGYOșI INTERMEDIATE READ

What Is Nmap and How to Use It to Enhance Network Security

Read More
tiktok logo on a black background
PUBLISHED BY ANDREEA CHEBAC QUICK READ

Cryptocurrency Scams to Heavily Target TikTok Users

Read More
Two people sitting in front of servers
PUBLISHED BY ANDREEA CHEBAC QUICK READ

EDR for Banking: 6 Ways EDR Can Help Financial Organizations

Read More
stethoscope listening to laptop, 10 best practices, endpoint security,
PUBLISHED BY MADALINA POPOVICI INTERMEDIATE READ

Best Practices for Endpoint Security in Healthcare Institutions

Read More
DNS Layer Security
PUBLISHED BY LIVIA GYONGYOșI INTERMEDIATE READ

How DNS Layer Security Stops Ransomware and Other Cyberattacks

Read More
stethoscope on dark background
PUBLISHED BY MADALINA POPOVICI INTERMEDIATE READ

Top 10 Healthcare Data Breaches [2022-2023]

Read More
lockbit hospital data breach
PUBLISHED BY CRISTIAN NEAGU QUICK READ

Two New York Hospitals Breached by the LockBit Ransomware Group

Read More
ransomware threats
PUBLISHED BY GABRIELLA ANTAL INTERMEDIATE READ

What Effect Does Firm Size Have on Ransomware Threats?

Read More
DNS IoCs in threat hunting (3)
PUBLISHED BY LIVIA GYONGYOșI QUICK READ

5 Examples of DNS IoCs That Are Red Flags for Cyberattacks

Read More
companies affected by ransomware in 2021 cover Heimdal security blog
PUBLISHED BY ANTONIA DIN INTERMEDIATE READ

Companies Affected by Ransomware [Updated 2023]

Read More
a florescent dollar sign on a black backgroung
PUBLISHED BY ANDREEA CHEBAC INTERMEDIATE READ

Banking Cybersecurity: The Risks Faced by Financial Institutions

Read More
prevent ransomware
PUBLISHED BY LIVIA GYONGYOșI QUICK READ

How to Use DNS IoCs to Prevent Ransomware Attacks

Read More
GitHub vulnerability 4000 repositories
PUBLISHED BY LIVIA GYONGYOșI QUICK READ

GitHub Vulnerability Exposes Over 4,000 Repositories to Repojacking Attacks

Read More
teams phishing attacks
PUBLISHED BY LIVIA GYONGYOșI QUICK READ

Microsoft Teams Phishing Attacks: Ransomware Group Shifts Tactics

Read More
1
2
3
…
110
SECURITY PRODUCTS FOR HOME USERS
FREE SOFTWARE UPDATER THREAT PREVENTION SOFTWARE ANTIVIRUS SOFTWARE PREMIUM SECURITY SUITE
SECURITY PRODUCTS FOR BUSINESSES
THREAT PREVENTION ENDPOINT PAM Software APPLICATION CONTROL PATCH MANAGEMENT SOFTWARE EMAIL FRAUD PREVENTION EMAIL SECURITY ENDPOINT ANTIVIRUS RANSOMWARE ENCRYPTION PROTECTION Remote Desktop Software EDR Software Cyber Threat Hunting
FREE SECURITY RESOURCES
Cyber Security Course for Beginners THE ULTIMATE WINDOWS 10 SECURITY GUIDE CYBER SECURITY GLOSSARY THE DAILY SECURITY TIP CYBER SECURITY FOR SMALL BUSINESS OWNERS CYBERSECURITY WEBINARS
COMPANY
ABOUT HEIMDAL MEDIA CENTER WRITE FOR US RESELLER PROGRAM AFFILIATE PROGRAM
©2014 - 2023 HEIMDAL SECURITY • VAT NO. 35802495 • VESTER FARIMAGSGADE 1 • 3 SAL • 1606 KØBENHAVN V
support@heimdalsecurity.com
Heimdal Security
Follow us on Twitter
Follow us on Facebook
Follow us on LinkedIn
Follow us on YouTube
Follow us on Instagram
Follow us on Pinterest