Cybersecurity News | Quick Read
Over 2 Million People Have Downloaded Android Malware from the Google Play Store
Five of the Threats that Have Managed to Infiltrate the Google Play Store Are Still Available.
Cybersecurity News | Quick Read
Ransomware Group Launches Search Site for Stolen Data
ALPHV Ransomware Created a Website Allowing Victims’ to Verify Whether Their Data Was Stolen.
Industry trends | Quick Read
Is Cybersecurity a Top Priority for Politicians? World Politics and Cybersecurity
A Word from the CEO
Cybersecurity Basics | Quick Read
An In-Depth Look at Software-Defined Perimeters
How Are SDPs Helping Businesses Stay Safe?
Cybersecurity Basics | Quick Read
What Is Legacy Software and a Legacy System in Business + The Risks
What Counts as Legacy Software. Why Businesses Still Use Legacy Software and What They Risk.
Cybersecurity News | Quick Read
Italian City Palermo Impacted by Cyberattack, Vice Society Ransomware Claims Responsibility
In Order to Contain the Damage, All Systems Had to Be Taken Offline.
Cybersecurity News | Quick Read
Security Experts Believe the Phishing Operation Has Been Active Since at Least September 2021.
Cybersecurity News | Quick Read
New Emotet Variant Scrapes Google Chrome Credit Card Info
Emotet Recently Started to Distribute a New Module.
Cybersecurity News | Quick Read
Chinese State-backed Actors Hack Telecom Firms to Steal Data
Here’s Everything You Need to Know About the Attack.
Cybersecurity News | Quick Read
Deadbolt Ransomware Uses Multi-Tiered Extortion
A Warning Was Issued Regarding Continuous Attacks Against NAS Equipment.
Cybersecurity News | Quick Read
Ransomware Gangs Now Employ a New Technique
They Conceal Their Victims’ Identities, Describing Them Only by Their Sector, Size, and Stolen Data, Thus Increasing Their Chances of Receiving the Requested Ransom.
Cybersecurity News | Quick Read
QBot Now Attacks Using Black Basta Ransomware
The Ransomware Operation Is Now Able to Propagate Laterally Across Hijacked Business Networks.
Cybersecurity News | Quick Read
Phishing Campaign Uses Reverse Tunnels and URL Shorteners
This Makes Stopping Malicious Activities More Difficult.
Patch management | Quick Read
What Is a CVE? Common Vulnerabilities and Exposures Explained
Common Vulnerabilities and Exposures Are a Cybersecurity Standard. Here Is Everything You Need to Know About Them.
Cybersecurity News | Quick Read
60GB of User Data Was Exposed by Australian Trading Company ACY Securities
A Representative of the Trading Giant Declared that the Exposed Server Was an “Insignificant One.”
Cybersecurity News | Quick Read
LockBit Malware Is Now Used by Evil Corp
The Threat Actors Are Trying to Circumvent Sanctions.
Cybersecurity News | Quick Read
Zero-day Exploited to Target Atlassian Confluence
The Severity of the Vulnerability Was Determined as Critical.
Cybersecurity News | Quick Read
Industrial Spy Is Now Targeting Corporate Websites to Display Ransom Notes
The Attackers Threaten to Sell the Victims’ Stolen Data on Their Tor Marketplace if They Fail to Pay the Ransom.
Cybersecurity News | Quick Read
New RuneScape Phishing Scam Aimed at Stealing Accounts and In-game Item Bank PINs
The Phishing Operation Sends a Bogus Email Update Notice to Old School and Standard Gamers to Steal Personal Information.
Security alerts | Quick Read
What is CVE-2022-30190? Workarounds and Cybersecurity Advice.
Data security | Quick Read
All About CTB Locker Ransomware
An in-depth analysis of CTB Locker Ransomware
Cybersecurity News | Quick Read
Malware Targeting Linux Becoming More Prevalent
In the last year, there has been a significant rise in the amount of malware that targets Linux platforms.
All things Heimdal | Quick Read
10K Followers on LinkedIn and Heimdal™’s LinkedIn Giveaway
We have recently reached 10k followers on LinkedIn. We want to give you something back!
Cybersecurity News | Quick Read
Clop Ransomware Has Returned and Is Busier than Ever
In April, the Ransomware Gang’s Data Leak Site Was Updated with 21 New Victims.
Cybersecurity News | Quick Read
As Malware Dissemination Drops, Mobile Trojan Detections Grow.
Researchers Observed a Declining Trend Regarding Mobile Virus Dissemination.
Email Security | Quick Read
What is PGP Encryption and How does it Work?
Factoring the PGP Encryption Algorithm. Applications of PGP in Email Communication.
Forensics and threat hunting | Quick Read
Threat Hunting Journal May 2022 Edition
Top Malware(s) Detections: 1st of May – 27th of May
One Platform. Total Security.
Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats