Heimdal
Latest Articles

Posts

News | Quick Read

CommonSpirit Health Breached, Over 623,000 Patients’ Data Exposed

The Compromised Data Includes Full Names, Addresses, Phone Numbers and More.

Endpoint security | Quick Read

What Is DNS Propagation and How to Keep Safe from DNS Attacks

Find Out What Impacts Your DNS Propagation and How to Mitigate DNS Attacks.

News | Quick Read

Diamond Industry Attacked by Iranian Hackers with Data-Wiping Malware

HR Firms and IT Consulting Companies Also Affected by the Malware.

News | Quick Read

Microsoft Warns a New Group of Threat Actors Is After Cryptocurrency Companies

DEV-0139 Hunts Potential Victims on Telegram Groups.

News | Quick Read

Mobile Malware Marketplace Found On Dark Web with 1900 Injection Scripts

Exclusive: the Largest Mobile Malware Marketplace Identified in the Dark Web.

News | Quick Read

French Brand Intersport Hit by Ransomware Group Hive

Personal Details of the Customers Leaked by the Threat Group.

News | Quick Read

Russian Bank VTB Is Currently Under the Largest Cyber Attack in Its History

‘IT Army of Ukraine’ Hacktivist Group Claims the Attack.

News | Quick Read

China May Be Behind the Latest Cyber Attack on Middle Eastern Telecoms

China’s Role in Cyber Attacks Against Middle Eastern Telecommunications.

News | Quick Read

Iranian State-backed Hackers Attack Independent Groups in the Middle East

Activists, Journalists, and Politicians Are Among the Targets.

News | Quick Read

Microsoft Warns of Russian Cyberattacks Throughout the Winter

Brace Yourself: Winter Is Coming and Russia’s Latest Cyber Attack Could Be Just Around the Corner.

News | Quick Read

BlackProxies Service Gains Notoriety in the Cybercrime World

New Proxy Service Sells Access to a Million IP Addresses Worldwide.

News | Quick Read

CISA Urges Agencies to Patch a Google Chrome Bug by December 26th

The Vulnerability Can Be Used by Threat Actors to Execute Arbitrary Code.

News | Quick Read

Threat Actors Use PRoot Isolated Filesystems to Hijack Linux Devices

Cybersecurity Researchers Say Cryptocurrency Mining Is Favorite Target.

News | Quick Read

Cryptonite Ransomware Toolkit Unintentionally Transforms into a Wiper

The Ransomware Never Offers the Decryption Key Do to Programming Flaws.

News | Quick Read

French Hospital Forced to Transfer Patients After Ransomware Attack

The Hospital Had to Partially Halt Its Operations.

News | Quick Read

FreeBSD Systems Exposed to Compromise Due to Ping Vulnerability

Critical Flaw Allows Remote Attackers to Take Over.

News | Quick Read

New SiriusXM Vulnerability Allows Hackers to Unlock and Start Connected Cars Remotely

More than 10 Million Vehicles Are Connected to the Service in North America.

News | Quick Read

A New Malware Exploits A Critical Vulnerability on Redis Servers

Experts Say that Redigo Malware Might Be Used to Facilitate DDoS Attacks.

News | Quick Read

Phishing Attack Strikes Apple Users During Black Friday Sales

Threat Actors Targeted More than 10,000 Mailboxes.

News | Quick Read

Lazarus Hacking Group Uses New Fake Crypto App to Spread Malware

The Group Is Targeting Crypto Assets.

News | Quick Read

Malicious Apps with Over 2 Million Installs Found on Google Play

The Apps Were Used to Deploy Malware and to Degrade User Experience.

Endpoint security | Quick Read

What Is Digital Forensics and Incident Response (DFIR)?

Find Out What Digital Forensics & Incident Response Is and How to Use Them In Your Favor.

News | Quick Read

Spanish Authorities Bust €12M Investment Scam Operation

The Cybercriminals Created Replicas of Popular Cryptocurrency Websites to Defraud Victims from All Over Europe.

News | Quick Read

Schoolyard Bully Trojan Is After Facebook Users' Accounts

More than 300,000 Devices Were Infected with This Android Malware.

News | Quick Read

The FBI Says This Ransomware Scam in Cuba Raked in $60 Million From Over 100 Victims

The Cuba Ransomware Group Has Launched Attacks Against 100 Organizations Around the World and Stolen $60 Million.

Cybersecurity Basics | Quick Read

What is Mimikatz? What can it do and how to protect

How Mimikatz is used and how to protect your organization against credential-theft attacks that leverage this tool

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats