Heimdal
Latest Articles

Posts

Email Security | Quick Read

Business Email Security Contributes to Business Stability

Here’s Everything to Know About Business Email Security.

Cybersecurity News | Quick Read

Cybercriminals Launch a New Malware-as-a-Service: the 'Eternity Project'

Hackers Can Choose Between an Info-stealer, a Miner, a Worm Spreader, or Ransomware Tools. Or They Can Get Them All!

Cybersecurity News | Quick Read

BPFdoor Has the Capacity to Bypass Firewalls

A New Linux Malware Has Been Discovered That Shows Anti-Evasion Techniques.

Cybersecurity News | Quick Read

WordPress Websites Files and Databases Injected with Malicious JavaScript

The Malicious Campaign Allowed the Attacker the Ability to Redirect the Website Users to a Location of Their Choosing.

Endpoint security | Quick Read

What Is RMM Software?

All You Need to Know about Remote Monitoring Management Software. A List of Open-Source RMM.

Cybersecurity News | Quick Read

South Asian Governments Targeted by Bitter APT Group

Based on Two Infection Chains, the Campaign Employes Malware with Remote File Execution Capabilities.

Cybersecurity News | Quick Read

Nerbian RAT Malware, New Threat on the Market

The New Remote Access Trojan Spreads Using COVID-19 and World Health Organization Themes.

Cybersecurity News | Quick Read

Hackers Are Going After Managed Security Providers

According to the FBI, CISA, and the NSA, Supply Chain Attacks Are Becoming More Common.

Cybersecurity News | Quick Read

New Phishing-as-a-Service Toolkit Discovered

Cybercriminals May Use Frappo to Attack Major Financial Institutions and Online Retailers.

Cybersecurity News | Quick Read

Windows Print Spooler Exploit: the Path for Threat Actors to Perform 65,000 Cyberattacks

Global Cyberattacks Have Grown Following Hacker’s Exploitation of a Print Spooler Bug.

Cybersecurity News | Quick Read

Don’t Underestimate the DCRat Malware!

Despite Its Low Cost, the Malware Has a Wide Range of Capabilities.

Cybersecurity News | Quick Read

Critical F5 BIG-IP Vulnerability Exploited by Hackers

Several F5 BIG-IP Modules Are Impacted.

Cybersecurity News | Quick Read

Lincoln College to Close Following Ransomware Attack

The Institution Will Suspend All Academic Activities at the Conclusion of the Spring Semester.

Cybersecurity News | Quick Read

Information Leading to the Arrest of Conti Ransomware Co-Conspirators to be Rewarded

The US Department of State Will Pay up to $10 Million for Information on Key Members of the Infamous Conti Cybercrime Gang.

Cybersecurity News | Quick Read

NIST Releases Advisory Guide on Supply Chain Attack Protection

NIST’s New Recommendations on Supply Chain Attack Prevention

Cybersecurity News | Quick Read

Windows Installer Used by New Raspberry Robin Worm

The Worm Creates a New Process that Uses cmd.exe to Run Malicious Files.

Cybersecurity Basics | Quick Read

Vendor Email Compromise (VEC) Explained

Definition, How VEC Attacks Work and Protective Measures.

Cybersecurity News | Quick Read

UK National Health Service Email Accounts Compromised by Hackers to Steal Microsoft Logins

Over 1000 Malicious Emails Have Been Sent from NHS Employees Email Accounts.

Cybersecurity News | Quick Read

BIG-IP RCE Bug Could Allow Device Takeover

Unauthenticated Attackers with Network Access Might Execute Arbitrary System Commands, Modify Files, and Disable Services on BIG-IP.

Cybersecurity News | Quick Read

Watch Out! Verified Twitter Accounts Are Targeted in Phishing Attacks

In these Phishing Emails Users Are Informed that Ignoring the Message Could Result in Account Suspension.

Cybersecurity News | Quick Read

Transport for NSW Suffers Cyber Incident

Its Online Authorised Inspection Scheme Application Was Accessed by an Unauthorised Third Party.

Cybersecurity News | Quick Read

Hacking Group Moshen Dragon Targets Asian Telecommunication Companies

The Infection Vector Used By the Malicious Actors Remains Unknown at this Time.

Cybersecurity News | Quick Read

Threat Actors Sent Malicious Emails Using Google SMTP Relay Service

In the First Two Weeks of April, Approximately 30,000 Emails Were Sent Using this Technique.

Cybersecurity News | Quick Read

REvil Ransomware Makes a Comeback

The Ransomware Operation Has Emerged with a New Infrastructure and a Modified Encryptor.

Cybersecurity News | Quick Read

Mental Health and Prayer Apps Do Not Meet Mozilla's Minimum Security Standards

User Security and Privacy Not a Priority for these Types of Apps.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats