Heimdal
Latest Articles

Posts

Patch management | Quick Read

What Is Vulnerability Assessment?

Everything You Need to Know to Conduct an Effective Vulnerability Assessment!

Access Management | Quick Read

Micro-Segmentation: Strengthening Network Security Through Granular Control

Exploring Micro-Segmentation and Its Role in Zero Trust (ZT) Strategy.

News | Quick Read

Cisco SD-WAN vManage Impacted by REST API Vulnerability

Multiple Versions Affected, Users Are Advised To Be Careful.

News | Quick Read

Zoom Vulnerabilities Allow Attackers to Escalate Privileges

Users Advised to Upgrade Their Software Version Now!

News | Quick Read

Chinese Hackers Breach Government Email

Microsoft: “The Action Was Intent on Conducting Espionage.”

News | Quick Read

International Diplomats Targeted by Russian Hacking Group APT29

Malicious Car Listings Discovered Targeting Diplomats in Ukraine.

News | Quick Read

11 Million Patients` Data Stolen in HCA Healthcare Data Breach

The Attack Affected 1,038 Hospitals and Physician Clinics Across 20 States.

News | Quick Read

EU Healthcare: ENISA Reports that 54% of Cyber Threats Are Ransomware

The Report Identifies the Top Healthcare Cyber Threats Over the Past Two Years.

News | Quick Read

Deutsche Bank, ING, and Postbank Customers` Data Exposed in Breach

The Banks Shared the Same Third-Party Vendor Who Was Victim of MOVEit Hacks.

News | Quick Read

Zero-day Alert! Microsoft Unpatched Vulnerability Exploited in NATO Summit Attacks

CVE-2023-36884 Enables Remote Code Execution over Malicious Office Documents.

News | Quick Read

A New Banking Trojan on the Rise: TOITOIN Banking Trojan

TOITOIN Targets Businesses in Latin America (LATAM).

News | Quick Read

New Ransomware Strain Discovered: Big Head

The New Big Head Ransomware Uses Bogus Windows Update Alert.

Cybersecurity Basics | Quick Read

What Is Vendor Risk Management (VRM)?

Definition, Key Indicators, Responsible Parties, and the Role of Cybersecurity Defenses.

News | Quick Read

StackRot: A New Linux Kernel Flaw Allows Privilege Escalation

The Vulnerability Is Impacting Linux Version 6.1 Through 6.4.

News | Quick Read

Malicious Insider Explained: The Call is Coming from Inside the House

Malicious Insider Is a Specific Type of Insider Threat You Should Watch Out For. Here’s What You Need to Know About It.

News | Quick Read

Top Data Breaches in 2023: Alarming Incidents Impacting Companies

A Recap of Data Breaches in the First Half of 2023.

News | Quick Read

CISA, FBI: A New Version of the Truebot Malware Is Actively Used in Attacks

The Malware Is Used to Exploit an RCE Vulnerability Found in Netwrix Auditor.

News | Quick Read

RedEnergy Stealer Ransomware: A New Threat Targeting Critical Infrastructure

RedEnergy Stealer Fits into the Hybrid Stealer-as-a-Ransomware Threat Category.

News | Quick Read

SMUGX Campaign Targets European Entities

European Organizations Targeted in SMUGX Campaign Utilizing HTML Smuggling Technique.

News | Quick Read

Ransomware Attackers Dump Students' Data Online After School Hacks

By Releasing Compromised Data Publicly, Attackers Follow Through on Their Threats.

News | Quick Read

Linux Ransomware Exposed: Not Just a Windows Problem Anymore

Exploring Linux Ransomware, Real-Life Examples, and Proactive Defense Measures.

Access Management | Quick Read

Internal Threats: A Major Risk to Any Business

Do You Know How to Mitigate Internal Threats?

News | Quick Read

New Meduza Infostealer Designed for Windows Collects Users’ and Systems` Data

The Malware Is Distributed on Dark Web Forums and Telegram.

News | Quick Read

LockBit Ransomware Attack Freezes Japan`s Largest Port Activities

Nagoya Port Authorities Expect the Port to Reopen on Thursday Morning.

News | Quick Read

What Is Passwordless Authentication?

And How It Can Benefit Your Organization.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats