Cybersecurity News | Quick Read
New PowerMagic and CommonMagic Malware Used by Threat Actors to Steal Data
The Frameworks Continue to Wreak Havoc in the Russian-Ukrainian Conflict Zone.
Cybersecurity News | Quick Read
Researchers Reveal Insights into CatB Ransomware's Advanced Evasion Methods
The CatB Ransomware Operation Uses a Special Technique to Evade Detection and Launch Payload.
Cybersecurity News | Quick Read
Ferrari Announces Data Breach. Customers Risk Data Leakage
The Breach Did Not Impact the Operational Functions of the Company.
Cybersecurity News | Quick Read
Banking Trojan Mispadu Found Responsible for 90,000+ Credentials Stolen
Researchers Reveal: Latin American Banks Targeted by Mispadu Banking Trojan.
Cybersecurity News | Quick Read
A Cancer Patient's Fight for Justice Against a Hospital Ransomware Attack
After Releasing Susceptible Records Online, the Victim Was Offered Two Years of Credit Monitoring.
Cybersecurity News | Quick Read
Emotet Malware Spreads Out Through Malicious Microsoft OneNote Attachments
Threat Actors Use Reply-Chain Emails to Spoof Guides, Invoices, or Job References.
Cybersecurity News | Quick Read
HinataBot: The Latest Go-based Threat Is Launching DDoS Attacks
New Go-Based Botnet Exploits Vulnerabilities and Weak Credentials.
Vulnerability | Quick Read
Cybersecurity News | Quick Read
AI-Generated YouTube Videos Spread Raccoon, RedLine, and Vidar Info-stealers
Videos Lure Victims by Claiming to Offer Cracked Adobe Photoshop, Premiere Pro, and Autocad Software.
Cybersecurity News | Quick Read
BianLian Ransomware: The Dangerous Shift Toward Pure Data Extortion
The BianLian Ransomware Group’s Focus Has Shifted from Encrypting Its Victims’ Files to Pure Data Extortion.
Cybersecurity News | Quick Read
Makop Ransomware: The Arsenal of Cybercriminals Becomes Known
Recent Intrusion Leads to Makop Ransomware Gang Toolkit Reveal.
Security alerts | Quick Read
SECURITY ALERT: Actively Exploited Microsoft Outlook Vulnerability Imperils Microsoft 365 Apps
High-Ranking Outlook Vulnerability Targeting Win 10 And Server 2022 Operating Systems.
Cybersecurity News | Quick Read
Australia’s Latitude Financial Hit by Cyberattack, Exposing 328K Client Data
At least 100K IDs Were Compromised.
Cybersecurity News | Quick Read
For Sale: Data Supposedly Coming from the US Marshals Service Hack
Hackers Posted Hundreds of Gigabytes of “Confidential Information”.
Cybersecurity News | Quick Read
CISA Warns of Adobe ColdFusion Vulnerability Exploited in the Wild
If Successfully Exploited, the Vulnerability Allows Threat Actors to Achieve Arbitrary Code Execution.
Cybersecurity News | Quick Read
LockBit Ransomware Claims to Have Stolen SpaceX Data from One of Its Contractors
3,000 Drawings Certified by SpaceX Engineers Were Allegedly Leaked.
Cybersecurity News | Quick Read
SAP Fixes Five Critical Vulnerabilities With Newly Released Security Update
19 Vulnerabilities Fixed in SAP’s March 2023 Security Patch Day.
Cybersecurity News | Quick Read
Security Organization Rubrik Affected by the GoAnywhere Zero-day Attacks
Rubrik Confirms Data Breach After Hackers Publish a Sample.
Cybersecurity News | Quick Read
KamikakaBot Malware Used to Attack Southeast Asian Government Agencies
The Malware’s Obfuscation Routine Has Improved to Better Evade Detection.
Cybersecurity News | Quick Read
FBI's Report Shows: Investment Fraud Caused Loses of Over $3 Billion in 2022
Investment Fraud Was the Most Common Cybercrime in 2022.
Uncategorized | Quick Read
What Is Cyber Essentials and How Can Heimdal Help Your Organization Achieve CE Compliance?
The Path Towards Cyber Essentials Compliance Made Easy.
Cybersecurity News | Quick Read
$197 Million in Cryptocurrency Stolen in Euler Finance Attack
A Flaw in the Donation and Liquidation Function Allowed the Attack.
Cybersecurity News | Quick Read
The Dark Side of Eurovision 2023: How Scammers Are Targeting Fans
Scammers Targeting Hotel Chains Are Putting Eurovision Fans’ Data at Risk.
Cybersecurity News | Quick Read
Fake Job Proposals Used to Deploy Malware - Security Researchers Targeted
Threat Actors Use Social Engineering Techniques to Persuade Their Victims.
Cybersecurity News | Quick Read
Air-Gapped Computers Vulnerable to Data Stealing Through Internal Speakers
CASPER Covert Channel Succeeded to Secretly Exfiltrate Data by Using a Smartphone.
One Platform. Total Security.
Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats