Heimdal
Latest Articles

Posts

Cybersecurity News | Quick Read

Deep Fakes of Elon Musk Promote BitVex Fraud

Scammers Are Using Bogus Elon Musk Videos to Promote a BitVex Trading Platform Fraud that Takes Deposited Money.

Cybersecurity News | Quick Read

500,000 Chicago Students' Data Exposed in Ransomware Attack

Battelle for Kids, Chicago Public Schools’ Vendor Experienced a Ransomware Attack.

Cybersecurity News | Quick Read

Conti Ransomware Shuts Down and Rebrands Itself

Despite Dropping the Conti Name, the Criminal Group Will Remain a Major Player in the Ransomware Landscape.

Cybersecurity News | Quick Read

Ransomware Hits Media Giant Nikkei’s Asian Unit

Hackers Gained Unauthorized Access to the Company’s Server.

Cybersecurity News | Quick Read

Ransomware Targets Higher Education Institutions

Three Educational Institutions Hit by Ransomware over Three Months.

Cybersecurity News | Quick Read

Specialists Spend a Lot of Time Fixing Security Flaws that Could Have Been Prevented

New Study Shows that it Takes Specialists Over Five Hours to Fix Vulnerabilities Found during the App Development Process.

Cybersecurity News | Quick Read

Jupiter Plugin Vulnerabilities Enable Hackers to Hijack Websites

WordPress Security Researchers Found Vulnerabilities Allowing Privilege Escalation.

Cybersecurity News | Quick Read

Millions of Cyberattacks Are Targeting Tatsu WordPress Plugin

Hackers Are Leveraging CVE-2021-25094, a Remote Code Execution Vulnerability.

Cybersecurity News | Quick Read

Top 10 Attack Vectors Most Exploited by Hackers Revealed

A Joint Advisory Describes Most Preferred Initial Access Attack Vectors by Threat Actors.

Cybersecurity News | Quick Read

Malicious PHP Code Used to Steal Banking Information, FBI Said

What Are the FBI’s Recommended Mitigations?

Cybersecurity News | Quick Read

'Thanos' Ransomware Builder Was Designed by a Physician

A French-Venezuelan Doctor Allegedly Created “Thanos” Ransomware and Other Cybercriminal Tools.

Cybersecurity News | Quick Read

NerbianRAT Trojan Spreads via Emails

Written in GO, the Malware Can Bypass Detection and Analysis.

Cybersecurity News | Quick Read

Phishing Threat Actors Still Fond of HTML Attachments

Here’s an Important Thing You Need to Know about HTML Attachments that Might Save You a Lot of Trouble.

Cybersecurity News | Quick Read

Serious Flaw in Firewalls and VPNs Manufactured by Zyxel Exploited

The Vulnerability Is Tracked as CVE-2022-30525 and Is a Command Injection Vulnerability.

Cybersecurity News | Quick Read

New Cybersecurity Directive Agreed between the European Parliament and EU Member States

The New Legislation Will Bring About a Greater Cybersecurity Level across the European Union.

Email Security | Quick Read

Business Email Security Contributes to Business Stability

Here’s Everything to Know About Business Email Security.

Cybersecurity News | Quick Read

Cybercriminals Launch a New Malware-as-a-Service: the 'Eternity Project'

Hackers Can Choose Between an Info-stealer, a Miner, a Worm Spreader, or Ransomware Tools. Or They Can Get Them All!

Cybersecurity News | Quick Read

BPFdoor Has the Capacity to Bypass Firewalls

A New Linux Malware Has Been Discovered That Shows Anti-Evasion Techniques.

Cybersecurity News | Quick Read

WordPress Websites Files and Databases Injected with Malicious JavaScript

The Malicious Campaign Allowed the Attacker the Ability to Redirect the Website Users to a Location of Their Choosing.

Endpoint security | Quick Read

What Is RMM Software?

All You Need to Know about Remote Monitoring Management Software. A List of Open-Source RMM.

Cybersecurity News | Quick Read

South Asian Governments Targeted by Bitter APT Group

Based on Two Infection Chains, the Campaign Employes Malware with Remote File Execution Capabilities.

Cybersecurity News | Quick Read

Nerbian RAT Malware, New Threat on the Market

The New Remote Access Trojan Spreads Using COVID-19 and World Health Organization Themes.

Cybersecurity News | Quick Read

Hackers Are Going After Managed Security Providers

According to the FBI, CISA, and the NSA, Supply Chain Attacks Are Becoming More Common.

Cybersecurity News | Quick Read

New Phishing-as-a-Service Toolkit Discovered

Cybercriminals May Use Frappo to Attack Major Financial Institutions and Online Retailers.

Cybersecurity News | Quick Read

Windows Print Spooler Exploit: the Path for Threat Actors to Perform 65,000 Cyberattacks

Global Cyberattacks Have Grown Following Hacker’s Exploitation of a Print Spooler Bug.

Cybersecurity News | Quick Read

Don’t Underestimate the DCRat Malware!

Despite Its Low Cost, the Malware Has a Wide Range of Capabilities.

Cybersecurity News | Quick Read

Critical F5 BIG-IP Vulnerability Exploited by Hackers

Several F5 BIG-IP Modules Are Impacted.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats