Heimdal
Latest Articles

Posts

Cybersecurity News | Quick Read

Social Engineering Attacks Target Morgan Stanley Client Accounts

Hackers Managed a Data Breach through Vishing.

Cybersecurity News | Quick Read

A Honda Vulnerability Allows Hackers to Use a Replay Attack

The Flaw Could Be Used to Unlock and Start Your Vehicle.

Cybersecurity Basics | Quick Read

What Is Data Loss Prevention and How You Can Approach DLP Security

DLP Security Ensures the Integrity of Your Company’s Data. Here’s What You Need to Know About It.

Cybersecurity Basics | Quick Read

Most Common Cyber Threats for Businesses

Top Cybersecurity Threats every Company Should Know

Cybersecurity News | Quick Read

ISPs and Diplomats Targeted by New Mustang Panda Hacking Campaign

The Threat Actors Group Is Leveraging a New Version of Korplug.

Cybersecurity News | Quick Read

Russian Cybercrime Market Owner Added to FBI’s Most Wanted List

Igor Dekhtyarchuk Was Accused in the Eastern District of Texas of Operating a Cybercrime Marketplace.

Cybersecurity News | Quick Read

10GB of Data Belonging to Nestlé Exposed [Updated]

The Anonymous Hacking Group Was Apparently Behind the Attack.

Cybersecurity News | Quick Read

Microsoft Source Code Allegedly Leaked [Updated]

The Lapsus$ Hacker Group Claims to Have Obtained Bing, Cortana, and Other Microsoft Projects’ Source Code From an Azure DevOps Server.

Cybersecurity News | Quick Read

Strengthening Your Online Security Ahead of Possible Russian Cyberattacks

The White House Issued a Warning to All US Organizations Recommending, among Others, Multi-factor Authentication.

Cybersecurity News | Quick Read

100,000 Google Play Users Targeted by Android Password Stealing Malware

Think Twice when Installing Craftsart Cartoon Photo Tools!

Cybersecurity News | Quick Read

New Phishing Toolset Allows for Browser in the Browser (BitB) Attacks

Hackers May Now Generate Successful Single Sign-On Phishing Login Forms Using Bogus Chrome Browser Windows.

Cybersecurity News | Quick Read

Diavol Ransomware Receives Free Decryptor

Use the Free Decryption Tool to Recover Your Files!

Cybersecurity Basics | Quick Read

Network Security 101 – Definition, Types, Threats, and More

Network Security Is a Multifaceted Process. Here’s Everything You Need to Know About It.

Cybersecurity News | Quick Read

SolarWinds Issues Warning on Possible Web Help Desk Instances Attacks

The Advisory Is Meant to Alert Clients about the Possible Exploitation of a Potential Security Flaw.

Cybersecurity News | Quick Read

Over 500 Domains Were Used in Phishing Operation to Steal Credentials

The Phishing Campaign Is Focusing on Gathering Credentials of Naver Users, According to Researchers.

Cybersecurity News | Quick Read

New Linux Botnet Discovered

The Botnet Is Exploiting the Log4J Vulnerability.

Cybersecurity News | Quick Read

Israel Government Sites Targeted by Major Cyberattack

According to Israel’s Defense Establishment, It Remains Unclear Who Was Behind What Could Be the Country’s Largest-Ever Cyberattack.

Cybersecurity News | Quick Read

“Dirty Pipe” Linux Flaw Affects a Wide Range of QNAP NAS Devices

The Vulnerability Might be Used to Acquire Elevated Privileges and Control of Vulnerable Systems.

Cybersecurity News | Quick Read

Bogus Valorant Cheat Lures on YouTube Infect Users with RedLine Stealer Malware

RedLine Malicious Program Is One of the Most Widely Used Password-stealing Malware Infections.

Cybersecurity News | Quick Read

Ubisoft Was the Victim of a Cyber Security Incident

The Malicious Actor Lapsus$ Could Be Behind the Attack.

Cybersecurity Basics | Quick Read

Proxy vs VPN - Differences and Advantages

Learn How They Can Help You Achieve Online Privacy and What’s Best for Your Company

Cybersecurity News | Quick Read

BazarBackdoor Malware Distributed via Corporate Website Contact Forms

Threat Actors Employ Different Techniques to Bypass Detection.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats