Heimdal
Latest Articles

Posts

News | Quick Read

Business Email Security Contributes to Business Stability

Here’s Everything to Know About Business Email Security.

News | Quick Read

Cybercriminals Launch a New Malware-as-a-Service: the 'Eternity Project'

Hackers Can Choose Between an Info-stealer, a Miner, a Worm Spreader, or Ransomware Tools. Or They Can Get Them All!

News | Quick Read

BPFdoor Has the Capacity to Bypass Firewalls

A New Linux Malware Has Been Discovered That Shows Anti-Evasion Techniques.

News | Quick Read

WordPress Websites Files and Databases Injected with Malicious JavaScript

The Malicious Campaign Allowed the Attacker the Ability to Redirect the Website Users to a Location of Their Choosing.

Endpoint security | Quick Read

What Is RMM Software?

All You Need to Know about Remote Monitoring Management Software. A List of Open-Source RMM.

News | Quick Read

South Asian Governments Targeted by Bitter APT Group

Based on Two Infection Chains, the Campaign Employes Malware with Remote File Execution Capabilities.

News | Quick Read

Nerbian RAT Malware, New Threat on the Market

The New Remote Access Trojan Spreads Using COVID-19 and World Health Organization Themes.

News | Quick Read

New Phishing-as-a-Service Toolkit Discovered

Cybercriminals May Use Frappo to Attack Major Financial Institutions and Online Retailers.

News | Quick Read

Don’t Underestimate the DCRat Malware!

Despite Its Low Cost, the Malware Has a Wide Range of Capabilities.

News | Quick Read

Vendor Email Compromise (VEC) Explained

Definition, How VEC Attacks Work and Protective Measures.

News | Quick Read

Transport for NSW Suffers Cyber Incident

Its Online Authorised Inspection Scheme Application Was Accessed by an Unauthorised Third Party.

News | Quick Read

Threat Actors Sent Malicious Emails Using Google SMTP Relay Service

In the First Two Weeks of April, Approximately 30,000 Emails Were Sent Using this Technique.

News | Quick Read

Conti’s BazarLoader Replaced with Bumblebee Malware

Similar in Techniques with BazarLoader and IcedID, Bumblebee Is Distributed in Phishing Campaigns.

News | Quick Read

Medical Software Company Fined €1.5M for Exposing 490k Patients' Data

Dedalus Biology Was Fined by the French Data Protection Regulator (CNIL).

News | Quick Read

The Tenet Case: Are Hackers Targeting the Healthcare Industry?

How Healthcare Can Stay Safe in this Cybersecurity Landscape.

News | Quick Read

Threat-Hunting Journal April 2022 – Easter Edition

Top Malware(s) Detections: 1st of April – 28th of April

News | Quick Read

Top Exploited Vulnerabilities in 2021 Revealed by Cybersecurity Firms

15 Common Flaws of Last Year Now Put Together in a List.

News | Quick Read

How Cybersecurity Businesses Are Tackling the Ukraine War: CyberNews Exclusive Interview

CEO Morten Kjærsgaard Shared His View on the Cybersecurity Industry through the Russia vs. Ukraine Conflict.

Access Management | Quick Read

Authentication vs. Authorization: Key Differences and Types

Authentication and Authorization Concepts. Authentication & Authorization Methods.

News | Quick Read

Millions of Laptops Impacted by Lenovo UEFI Firmware Vulnerabilities

If Abused, Hackers Could Deploy and Run Firmware Implants.

News | Quick Read

A Zero-Click Vulnerability Is Exploited by NSO Spyware

The New Zero-Click iMessage Vulnerability May be Used to Install the Malware on iPhones.

News | Quick Read

Lazarus Hackers Make Use of Fraudulent Crypto Apps, US Warns

The Threat Actors Use Social Engineering Techniques to Lure Victims to Download Malicious Apps.

News | Quick Read

What Is Email Spam?

How to Identify and Stop Spam Emails.

News | Quick Read

Nordex Hit by Conti Ransomware

The Wind Turbine Developer Had to Shut Down Its IT Systems in Order to Prevent the Spread of the Attack.

Cybersecurity Basics | Quick Read

What Is Data Leakage?

Best Practices on Data Leakage Prevention.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats