Heimdal
Latest Articles

Posts

Endpoint security | Quick Read

What Is RMM Software?

All You Need to Know about Remote Monitoring Management Software. A List of Open-Source RMM.

Cybersecurity News | Quick Read

South Asian Governments Targeted by Bitter APT Group

Based on Two Infection Chains, the Campaign Employes Malware with Remote File Execution Capabilities.

Cybersecurity News | Quick Read

Nerbian RAT Malware, New Threat on the Market

The New Remote Access Trojan Spreads Using COVID-19 and World Health Organization Themes.

Cybersecurity News | Quick Read

Hackers Are Going After Managed Security Providers

According to the FBI, CISA, and the NSA, Supply Chain Attacks Are Becoming More Common.

Cybersecurity News | Quick Read

New Phishing-as-a-Service Toolkit Discovered

Cybercriminals May Use Frappo to Attack Major Financial Institutions and Online Retailers.

Cybersecurity News | Quick Read

Windows Print Spooler Exploit: the Path for Threat Actors to Perform 65,000 Cyberattacks

Global Cyberattacks Have Grown Following Hacker’s Exploitation of a Print Spooler Bug.

Cybersecurity News | Quick Read

Don’t Underestimate the DCRat Malware!

Despite Its Low Cost, the Malware Has a Wide Range of Capabilities.

Cybersecurity News | Quick Read

Critical F5 BIG-IP Vulnerability Exploited by Hackers

Several F5 BIG-IP Modules Are Impacted.

Cybersecurity News | Quick Read

Lincoln College to Close Following Ransomware Attack

The Institution Will Suspend All Academic Activities at the Conclusion of the Spring Semester.

Cybersecurity News | Quick Read

Information Leading to the Arrest of Conti Ransomware Co-Conspirators to be Rewarded

The US Department of State Will Pay up to $10 Million for Information on Key Members of the Infamous Conti Cybercrime Gang.

Cybersecurity News | Quick Read

NIST Releases Advisory Guide on Supply Chain Attack Protection

NIST’s New Recommendations on Supply Chain Attack Prevention

Cybersecurity News | Quick Read

Windows Installer Used by New Raspberry Robin Worm

The Worm Creates a New Process that Uses cmd.exe to Run Malicious Files.

Cybersecurity Basics | Quick Read

Vendor Email Compromise (VEC) Explained

Definition, How VEC Attacks Work and Protective Measures.

Cybersecurity News | Quick Read

UK National Health Service Email Accounts Compromised by Hackers to Steal Microsoft Logins

Over 1000 Malicious Emails Have Been Sent from NHS Employees Email Accounts.

Cybersecurity News | Quick Read

BIG-IP RCE Bug Could Allow Device Takeover

Unauthenticated Attackers with Network Access Might Execute Arbitrary System Commands, Modify Files, and Disable Services on BIG-IP.

Cybersecurity News | Quick Read

Watch Out! Verified Twitter Accounts Are Targeted in Phishing Attacks

In these Phishing Emails Users Are Informed that Ignoring the Message Could Result in Account Suspension.

Cybersecurity News | Quick Read

Transport for NSW Suffers Cyber Incident

Its Online Authorised Inspection Scheme Application Was Accessed by an Unauthorised Third Party.

Cybersecurity News | Quick Read

Hacking Group Moshen Dragon Targets Asian Telecommunication Companies

The Infection Vector Used By the Malicious Actors Remains Unknown at this Time.

Cybersecurity News | Quick Read

Threat Actors Sent Malicious Emails Using Google SMTP Relay Service

In the First Two Weeks of April, Approximately 30,000 Emails Were Sent Using this Technique.

Cybersecurity News | Quick Read

REvil Ransomware Makes a Comeback

The Ransomware Operation Has Emerged with a New Infrastructure and a Modified Encryptor.

Cybersecurity News | Quick Read

Mental Health and Prayer Apps Do Not Meet Mozilla's Minimum Security Standards

User Security and Privacy Not a Priority for these Types of Apps.

Cybersecurity News | Quick Read

Conti’s BazarLoader Replaced with Bumblebee Malware

Similar in Techniques with BazarLoader and IcedID, Bumblebee Is Distributed in Phishing Campaigns.

Cybersecurity News | Quick Read

Medical Software Company Fined €1.5M for Exposing 490k Patients' Data

Dedalus Biology Was Fined by the French Data Protection Regulator (CNIL).

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats