Heimdal
Latest Articles

Posts

Cybersecurity News | Quick Read

Over 2 Million People Have Downloaded Android Malware from the Google Play Store

Five of the Threats that Have Managed to Infiltrate the Google Play Store Are Still Available.

Cybersecurity News | Quick Read

Ransomware Group Launches Search Site for Stolen Data

ALPHV Ransomware Created a Website Allowing Victims’ to Verify Whether Their Data Was Stolen.

Cybersecurity Basics | Quick Read

An In-Depth Look at Software-Defined Perimeters

How Are SDPs Helping Businesses Stay Safe?

Cybersecurity Basics | Quick Read

What Is Legacy Software and a Legacy System in Business + The Risks

What Counts as Legacy Software. Why Businesses Still Use Legacy Software and What They Risk.

Cybersecurity Basics | Quick Read

What Is Cloud Email?

Definition, Benefits and Drawbacks.

Cybersecurity News | Quick Read

Italian City Palermo Impacted by Cyberattack, Vice Society Ransomware Claims Responsibility

In Order to Contain the Damage, All Systems Had to Be Taken Offline.

Cybersecurity News | Quick Read

Millions of Users Have Been Enticed to Phishing Pages in Massive Campaign Exploiting Facebook Messenger

Security Experts Believe the Phishing Operation Has Been Active Since at Least September 2021.

Cybersecurity News | Quick Read

New Emotet Variant Scrapes Google Chrome Credit Card Info

Emotet Recently Started to Distribute a New Module.

Cybersecurity News | Quick Read

Chinese State-backed Actors Hack Telecom Firms to Steal Data

Here’s Everything You Need to Know About the Attack.

Cybersecurity News | Quick Read

Deadbolt Ransomware Uses Multi-Tiered Extortion

A Warning Was Issued Regarding Continuous Attacks Against NAS Equipment.

Cybersecurity News | Quick Read

Ransomware Gangs Now Employ a New Technique

They Conceal Their Victims’ Identities, Describing Them Only by Their Sector, Size, and Stolen Data, Thus Increasing Their Chances of Receiving the Requested Ransom.

Cybersecurity News | Quick Read

QBot Now Attacks Using Black Basta Ransomware

The Ransomware Operation Is Now Able to Propagate Laterally Across Hijacked Business Networks.

Cybersecurity News | Quick Read

Phishing Campaign Uses Reverse Tunnels and URL Shorteners

This Makes Stopping Malicious Activities More Difficult.

Patch management | Quick Read

What Is a CVE? Common Vulnerabilities and Exposures Explained

Common Vulnerabilities and Exposures Are a Cybersecurity Standard. Here Is Everything You Need to Know About Them.

Cybersecurity News | Quick Read

60GB of User Data Was Exposed by Australian Trading Company ACY Securities

A Representative of the Trading Giant Declared that the Exposed Server Was an “Insignificant One.”

Cybersecurity News | Quick Read

LockBit Malware Is Now Used by Evil Corp 

The Threat Actors Are Trying to Circumvent Sanctions.

Cybersecurity News | Quick Read

Zero-day Exploited to Target Atlassian Confluence

The Severity of the Vulnerability Was Determined as Critical.

Cybersecurity News | Quick Read

Industrial Spy Is Now Targeting Corporate Websites to Display Ransom Notes

The Attackers Threaten to Sell the Victims’ Stolen Data on Their Tor Marketplace if They Fail to Pay the Ransom.

Cybersecurity News | Quick Read

New RuneScape Phishing Scam Aimed at Stealing Accounts and In-game Item Bank PINs

The Phishing Operation Sends a Bogus Email Update Notice to Old School and Standard Gamers to Steal Personal Information.

Data security | Quick Read

All About CTB Locker Ransomware

An in-depth analysis of CTB Locker Ransomware

Cybersecurity News | Quick Read

Malware Targeting Linux Becoming More Prevalent

In the last year, there has been a significant rise in the amount of malware that targets Linux platforms.

All things Heimdal | Quick Read

10K Followers on LinkedIn and Heimdal™’s LinkedIn Giveaway

We have recently reached 10k followers on LinkedIn. We want to give you something back!

Cybersecurity News | Quick Read

Clop Ransomware Has Returned and Is Busier than Ever

In April, the Ransomware Gang’s Data Leak Site Was Updated with 21 New Victims.

Cybersecurity News | Quick Read

As Malware Dissemination Drops, Mobile Trojan Detections Grow.

Researchers Observed a Declining Trend Regarding Mobile Virus Dissemination.

Email Security | Quick Read

What is PGP Encryption and How does it Work?

Factoring the PGP Encryption Algorithm. Applications of PGP in Email Communication.

Forensics and threat hunting | Quick Read

Threat Hunting Journal May 2022 Edition

Top Malware(s) Detections: 1st of May – 27th of May

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats