Cybersecurity News | Quick Read
OPERA1ER Gang Stole $11M from African Banks and Telecom Companies
The Group Performed 35 Attacks in 15 Countries Over the Course of 4 Years.
Cybersecurity News | Quick Read
Supply-Chain Attack Compromises Hundreds of U.S. News Websites
Readers of Over 250 Newspapers Are Exposed to Malware Infection.
Cybersecurity News | Quick Read
Crimson Kingsnake Gang Uses BEC Attacks to Impersonate Law Firms
92 Domains Linked to the Threat Actor Identified.
Cybersecurity News | Quick Read
Vodafone Italy Confirms September Data Breach
IDs and Contact Information, Among Possible Compromised Data.
Cybersecurity News | Quick Read
Royal Mail’s Website Suspended Due to a Data Breach
The Breach Exposes Customer Information to Other Users.
Cybersecurity News | Quick Read
TikTok’s New Privacy Policy Allows Staff Members Worldwide to Access European Users’ Data
Details on the New Updates.
Forensics and threat hunting | Quick Read
Heimdal® Launches Broad Investigation into Russian Cybercrime Trend
Russian Cybercrime Phenomenon Skyrockets Amidst Ongoing European Conflict.
Cybersecurity News | Quick Read
Four Google Play Apps With Over 1 Million Installs Are Deploying Malware
Many Users Complained About the Intrusive Ads that Launch by Themselves.
Cybersecurity News | Quick Read
Google Ad Exploited to Deliver Infostealing Malware
GIMP.org Lookalike Site Tricks Users into Downloading Malicious Executable.
Cybersecurity News | Quick Read
Successful Phishing Attack Causes Dropbox Data Breach
The Hackers Stole 130 Code Repositories.
Cybersecurity News | Quick Read
SandStrike Spyware Uses VPN App to Infect Android Devices
The Spyware Targets Primarily the Middle East Area.
Cybersecurity News | Quick Read
$4 Million in Exchange for Access to 576 Corporate Networks
A New Cybersecurity Report for Q3 2022 Shows Increase in Value Offerings.
Cybersecurity Basics | Quick Read
Denmark’s Journey to Becoming the Most Cyber-Secure Country
Is IT Security a Big Enough Political Topic for Danes?
Cybersecurity News | Quick Read
Multiple Vulnerabilities Discovered in Juniper Junos OS
Critical Security Flaws in Juniper Networks Devices Could Lead to System Compromise.
Cybersecurity News | Quick Read
Instagram Bug Causes Users’ Accounts Suspension
The Meta-Owned Company Addresses the Issue.
Industry trends | Quick Read
Who Is Responsible for Developing a Cybersecurity Culture?
A Word from the CEO
Cybersecurity News | Quick Read
German Student Behind One of the Country's Biggest Dark Web Markets
The Darknet Platform Had Over 16,000 Registered Members and 28,000 Posts.
Cybersecurity News | Quick Read
Five Play Store Droppers Target 200 Banking and Cryptocurrency Wallets Apps
SharkBot and Vultur Trojans Were Used in the Operation.
Cybersecurity News | Quick Read
EU Copper Giant Aurubis Hit by Cyberattack
IT Outage Ensues Following Ransomware-like Attack.
Ransomware | Quick Read
Cybersecurity News | Quick Read
Raspberry Robin Linked to Clop Ransomware Attacks
Microsoft Connects Worm Malware to Pre-Ransomware Activity.
Access Management | Quick Read
What Is an Access Control List (ACL)?
Definition, Types and Benefits.
Cybersecurity News | Quick Read
18 Indian Banks Targeted by New Version of Drinik Android Malware
The Malware Steals Users’ Credentials Via a New and Improved Technique.
Cybersecurity News | Quick Read
Ransomware Attack Announced by Australian Clinical Labs after Nine Months
Personal Data of 223,000 People Exposed.
Cybersecurity News | Quick Read
New York Post Website and Twitter Account Hacked
The Hackers Used the Website to Publish Offensive Headlines Targeting Politicians.
Access Management | Quick Read
Cybersecurity News | Quick Read
US Education Sector Attacked by Vice Society Ransomware
Researchers from Microsoft Released an Advisory Sharing their Findings on the Group’s Activity.
Patch management | Quick Read
Linux Patch Management Challenges, Pros, and Cons
Challenges in Linux Patch Management
One Platform. Total Security.
Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats