Heimdal
Latest Articles

Posts

Cybersecurity News | Quick Read

Fake Android App Used to Exfiltrate Signal and WhatsApp User Data

The App Can Steal Call Logs, Text Messages, and GPS locations.

Cybersecurity News | Quick Read

BAZAN Group, Israel's Largest Oil Refinery, Had Its Website Hit by a DDoS Attack

Cybercriminals Claim They Managed to Exfiltrate Sensitive Data.

Ransomware | Quick Read

Locky Ransomware 101: Everything You Need to Know

How Locky Ransomware Works and How to Stay Safe from It. Detection, Decryption and Safety Tips for Locky Ransomware.

Cybersecurity Basics | Quick Read

DNS Protection: A Must-Have Defense Against Cyber Attacks

“Better Safe than Sorry” or Why Businesses Can’t Afford to Overlook DNS Protection.

Cybersecurity News | Quick Read

Black Basta Ransomware Attacks Global Technology Company ABB (UPDATED)

The Attack Has Caused Significant Disruption to the Company’s Operations.

Ransomware | Quick Read

The Road to Redemption: Ransomware Recovery Strategies for Businesses

Navigating The Aftermath of Ransomware Attacks.

Cybersecurity News | Quick Read

U.S. Government Contractor Maximus Hit by Massive Data Breach

8 to 11 Million Individuals Affected by the Breach.

Forensics and threat hunting | Quick Read

Dark Power Ransomware Abusing Vulnerable Dynamic-Link Libraries in Resolved API Flow

An Ongoing Investigation into Emergent Cryptolocking Ransomware Strain.

Cybersecurity News | Quick Read

Cyberattack Investigation Shuts Down Ambulance Patient Records System

As Vendor Awaits Forensic Investigation, 12M UK Trusts Are Affected.

Patch management | Quick Read

What Is a Vulnerability Management Program?

How to Build an Effective Vulnerability Management Program.

Cybersecurity News | Quick Read

Terrestrial Trunked Radio System Vulnerable to Leakage and Message Injection

The TETRA Protocol Is Widely Used in Emergency Services, Military, and Infrastructure Communication.

Cybersecurity News | Quick Read

Norwegian Government`s System Breached over Ivanti EPMM Zero-Day

The Compromised Software Platform Was Used by 12 of the Country`s Ministers.

Patch management | Quick Read

What Is Vulnerability Scanning: Definition, Types, Best Practices

Explaining Vulnerability Scanning And How It Can Help Your Business.

Cybersecurity News | Quick Read

New Vulnerability Puts 926,000 MikroTik Routers at Risk! Users Urged to Patch

Elevation Flaw CVE-2023-30799 Enables Full Access to RouteOS Operating System.

Cybersecurity News | Quick Read

Yamaha Confirms Cyber Attack on Its Canadian Division

The Company Experienced Unauthorized Access and Data Theft.

Cybersecurity News | Quick Read

Lazarus APT Group Targets Windows IIS Web Servers to Distribute Malware

The Attackers Use a Variety of Techniques to Gain Access and Compromise the Systems.

Cybersecurity News | Quick Read

Open Source Software Supply Chain Attacks Spotted Targeting the Banking Sector

The Attackers Used Sophisticated Techniques: Employee Spoofing, Customized Malware and More.

Cybersecurity News | Quick Read

Stolen Microsoft Key: The Impact Is Higher Than Expected

The Key Offered the Attackers Widespread Access to Microsoft Cloud Services.

Cybersecurity News | Quick Read

Mallox Ransomware Witnessing Alarming Surge in Activity

Ransomware Group Exploits Weak MS-SQL Servers.

Cybersecurity News | Quick Read

New Severe Vulnerabilities Found in AMI MegaRAC BMC Software

The Flaws Expose Servers to Remote Code Execution Attacks.

Cybersecurity News | Quick Read

Critical Zyxel Firewall Vulnerability Exploited in DDOS Attacks

Attackers Gain Unauthorized Control Over the Vulnerable Systems.

Cybersecurity News | Quick Read

Tampa General Hospital Reports Cybercriminals Stole 1.2M Patient Data

The Hospital Will Provide Notice Letters, Free Credit Monitoring, and Identity Theft Prevention Services to those Affected.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats