Heimdal
Latest Articles

Posts

Endpoint security | Quick Read

9 Best CrowdStrike Alternatives in 2025

A Comprehensive Comparison of Top Security Solutions for Businesses in 2025.

Ransomware | Quick Read

Locking Out Cybercriminals: Here's How to Prevent Ransomware Attacks

13 Actionable Steps to Prevent Ransomware Attacks.

Cybersecurity News | Quick Read

Eyes on IDOR Vulnerabilities! US and Australia Release Joint Advisory

Developers Are Encouraged to Implement the Secure-by-design Principle.

Cybersecurity News | Quick Read

Staff at NHS Lanarkshire Exposed Patient`s Data on Unauthorized WhatsApp Group

The Team Used the Group for Communication During Covid Restrictions.

Cybersecurity News | Quick Read

Hot Topic Announces Potential Data Breach Due to Stolen Account Credentials

Automated Credential Stuffing Attacks Used to Expose Personal Data.

Cybersecurity News | Quick Read

New SEC Regulations: US Businesses Must Report Cyberattacks within 4 Days

The New Rules Aim to Bring More Transparency into Cybersecurity Threats.

Cybersecurity News | Quick Read

Fake Android App Used to Exfiltrate Signal and WhatsApp User Data

The App Can Steal Call Logs, Text Messages, and GPS locations.

Cybersecurity News | Quick Read

BAZAN Group, Israel's Largest Oil Refinery, Had Its Website Hit by a DDoS Attack

Cybercriminals Claim They Managed to Exfiltrate Sensitive Data.

Ransomware | Quick Read

Locky Ransomware 101: Everything You Need to Know

How Locky Ransomware Works and How to Stay Safe from It. Detection, Decryption and Safety Tips for Locky Ransomware.

Cybersecurity Basics | Quick Read

DNS Protection: A Must-Have Defense Against Cyber Attacks

“Better Safe than Sorry” or Why Businesses Can’t Afford to Overlook DNS Protection.

Cybersecurity News | Quick Read

Black Basta Ransomware Attacks Global Technology Company ABB (UPDATED)

The Attack Has Caused Significant Disruption to the Company’s Operations.

Ransomware | Quick Read

The Road to Redemption: Ransomware Recovery Strategies for Businesses

Navigating The Aftermath of Ransomware Attacks.

Cybersecurity News | Quick Read

U.S. Government Contractor Maximus Hit by Massive Data Breach

8 to 11 Million Individuals Affected by the Breach.

Forensics and threat hunting | Quick Read

Dark Power Ransomware Abusing Vulnerable Dynamic-Link Libraries in Resolved API Flow

An Ongoing Investigation into Emergent Cryptolocking Ransomware Strain.

Cybersecurity News | Quick Read

Cyberattack Investigation Shuts Down Ambulance Patient Records System

As Vendor Awaits Forensic Investigation, 12M UK Trusts Are Affected.

Patch management | Quick Read

What Is a Vulnerability Management Program?

How to Build an Effective Vulnerability Management Program.

Cybersecurity News | Quick Read

Terrestrial Trunked Radio System Vulnerable to Leakage and Message Injection

The TETRA Protocol Is Widely Used in Emergency Services, Military, and Infrastructure Communication.

Cybersecurity News | Quick Read

Norwegian Government`s System Breached over Ivanti EPMM Zero-Day

The Compromised Software Platform Was Used by 12 of the Country`s Ministers.

Patch management | Quick Read

What Is Vulnerability Scanning: Definition, Types, Best Practices

Explaining Vulnerability Scanning And How It Can Help Your Business.

Cybersecurity News | Quick Read

New Vulnerability Puts 926,000 MikroTik Routers at Risk! Users Urged to Patch

Elevation Flaw CVE-2023-30799 Enables Full Access to RouteOS Operating System.

Cybersecurity News | Quick Read

Yamaha Confirms Cyber Attack on Its Canadian Division

The Company Experienced Unauthorized Access and Data Theft.

Cybersecurity News | Quick Read

Lazarus APT Group Targets Windows IIS Web Servers to Distribute Malware

The Attackers Use a Variety of Techniques to Gain Access and Compromise the Systems.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats