Heimdal
Latest Articles

Posts

Email Security | Quick Read

What is PGP Encryption and How does it Work?

Factoring the PGP Encryption Algorithm. Applications of PGP in Email Communication.

Forensics and threat hunting | Quick Read

Threat Hunting Journal May 2022 Edition

Top Malware(s) Detections: 1st of May – 27th of May

Cybersecurity News | Quick Read

Zyxel Issues Security Warning

This Warning Is Concerning Vulnerabilities in Its Firewall, Access Point, and Access Point Controller Devices.

Cybersecurity News | Quick Read

New Ransomware Variant Dubbed ‘Cheers’ Discovered

The Linux-based Ransomware Variant Is Compromising ESXi Servers.

Cybersecurity Basics | Quick Read

Supply Chain Risk Management (SCRM) Explained

Why SCRM Is Important for Your Organization.

Cybersecurity News | Quick Read

SpiceJet Suffers Ransomware Attack

The Attack Resulted in Delayed Departures of the Flights Scheduled for Wednesday Morning. 

Cybersecurity Basics | Quick Read

What Is Ping of Death?

A Comprehensive Guide about PoD and How to Prevent It?

Cybersecurity News | Quick Read

GM Credential Stuffing Attack Reveals Automobile Owners' Details

The Attack Exposed User Information and Allowed Hackers to Cash Rewards Points for Gift Cards.

Cybersecurity News | Quick Read

Deep Fakes of Elon Musk Promote BitVex Fraud

Scammers Are Using Bogus Elon Musk Videos to Promote a BitVex Trading Platform Fraud that Takes Deposited Money.

Cybersecurity News | Quick Read

500,000 Chicago Students' Data Exposed in Ransomware Attack

Battelle for Kids, Chicago Public Schools’ Vendor Experienced a Ransomware Attack.

Cybersecurity News | Quick Read

Conti Ransomware Shuts Down and Rebrands Itself

Despite Dropping the Conti Name, the Criminal Group Will Remain a Major Player in the Ransomware Landscape.

Cybersecurity News | Quick Read

Ransomware Hits Media Giant Nikkei’s Asian Unit

Hackers Gained Unauthorized Access to the Company’s Server.

Cybersecurity News | Quick Read

Ransomware Targets Higher Education Institutions

Three Educational Institutions Hit by Ransomware over Three Months.

Cybersecurity News | Quick Read

Specialists Spend a Lot of Time Fixing Security Flaws that Could Have Been Prevented

New Study Shows that it Takes Specialists Over Five Hours to Fix Vulnerabilities Found during the App Development Process.

Cybersecurity News | Quick Read

Jupiter Plugin Vulnerabilities Enable Hackers to Hijack Websites

WordPress Security Researchers Found Vulnerabilities Allowing Privilege Escalation.

Cybersecurity News | Quick Read

Millions of Cyberattacks Are Targeting Tatsu WordPress Plugin

Hackers Are Leveraging CVE-2021-25094, a Remote Code Execution Vulnerability.

Cybersecurity News | Quick Read

Top 10 Attack Vectors Most Exploited by Hackers Revealed

A Joint Advisory Describes Most Preferred Initial Access Attack Vectors by Threat Actors.

Cybersecurity News | Quick Read

Malicious PHP Code Used to Steal Banking Information, FBI Said

What Are the FBI’s Recommended Mitigations?

Cybersecurity News | Quick Read

'Thanos' Ransomware Builder Was Designed by a Physician

A French-Venezuelan Doctor Allegedly Created “Thanos” Ransomware and Other Cybercriminal Tools.

Cybersecurity News | Quick Read

NerbianRAT Trojan Spreads via Emails

Written in GO, the Malware Can Bypass Detection and Analysis.

Cybersecurity News | Quick Read

Phishing Threat Actors Still Fond of HTML Attachments

Here’s an Important Thing You Need to Know about HTML Attachments that Might Save You a Lot of Trouble.

Cybersecurity News | Quick Read

Serious Flaw in Firewalls and VPNs Manufactured by Zyxel Exploited

The Vulnerability Is Tracked as CVE-2022-30525 and Is a Command Injection Vulnerability.

Cybersecurity News | Quick Read

New Cybersecurity Directive Agreed between the European Parliament and EU Member States

The New Legislation Will Bring About a Greater Cybersecurity Level across the European Union.

Email Security | Quick Read

Business Email Security Contributes to Business Stability

Here’s Everything to Know About Business Email Security.

Cybersecurity News | Quick Read

Cybercriminals Launch a New Malware-as-a-Service: the 'Eternity Project'

Hackers Can Choose Between an Info-stealer, a Miner, a Worm Spreader, or Ransomware Tools. Or They Can Get Them All!

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats