Heimdal
Latest Articles

Posts

News | Quick Read

Cybercriminals Launch a New Malware-as-a-Service: the 'Eternity Project'

Hackers Can Choose Between an Info-stealer, a Miner, a Worm Spreader, or Ransomware Tools. Or They Can Get Them All!

News | Quick Read

BPFdoor Has the Capacity to Bypass Firewalls

A New Linux Malware Has Been Discovered That Shows Anti-Evasion Techniques.

News | Quick Read

WordPress Websites Files and Databases Injected with Malicious JavaScript

The Malicious Campaign Allowed the Attacker the Ability to Redirect the Website Users to a Location of Their Choosing.

Endpoint security | Quick Read

What Is RMM Software?

All You Need to Know about Remote Monitoring Management Software. A List of Open-Source RMM.

News | Quick Read

South Asian Governments Targeted by Bitter APT Group

Based on Two Infection Chains, the Campaign Employes Malware with Remote File Execution Capabilities.

News | Quick Read

Nerbian RAT Malware, New Threat on the Market

The New Remote Access Trojan Spreads Using COVID-19 and World Health Organization Themes.

News | Quick Read

Hackers Are Going After Managed Security Providers

According to the FBI, CISA, and the NSA, Supply Chain Attacks Are Becoming More Common.

News | Quick Read

New Phishing-as-a-Service Toolkit Discovered

Cybercriminals May Use Frappo to Attack Major Financial Institutions and Online Retailers.

News | Quick Read

Windows Print Spooler Exploit: the Path for Threat Actors to Perform 65,000 Cyberattacks

Global Cyberattacks Have Grown Following Hacker’s Exploitation of a Print Spooler Bug.

News | Quick Read

Don’t Underestimate the DCRat Malware!

Despite Its Low Cost, the Malware Has a Wide Range of Capabilities.

News | Quick Read

Critical F5 BIG-IP Vulnerability Exploited by Hackers

Several F5 BIG-IP Modules Are Impacted.

News | Quick Read

Lincoln College to Close Following Ransomware Attack

The Institution Will Suspend All Academic Activities at the Conclusion of the Spring Semester.

News | Quick Read

Information Leading to the Arrest of Conti Ransomware Co-Conspirators to be Rewarded

The US Department of State Will Pay up to $10 Million for Information on Key Members of the Infamous Conti Cybercrime Gang.

News | Quick Read

NIST Releases Advisory Guide on Supply Chain Attack Protection

NIST’s New Recommendations on Supply Chain Attack Prevention

News | Quick Read

Windows Installer Used by New Raspberry Robin Worm

The Worm Creates a New Process that Uses cmd.exe to Run Malicious Files.

News | Quick Read

Vendor Email Compromise (VEC) Explained

Definition, How VEC Attacks Work and Protective Measures.

News | Quick Read

UK National Health Service Email Accounts Compromised by Hackers to Steal Microsoft Logins

Over 1000 Malicious Emails Have Been Sent from NHS Employees Email Accounts.

News | Quick Read

BIG-IP RCE Bug Could Allow Device Takeover

Unauthenticated Attackers with Network Access Might Execute Arbitrary System Commands, Modify Files, and Disable Services on BIG-IP.

News | Quick Read

Watch Out! Verified Twitter Accounts Are Targeted in Phishing Attacks

In these Phishing Emails Users Are Informed that Ignoring the Message Could Result in Account Suspension.

News | Quick Read

Transport for NSW Suffers Cyber Incident

Its Online Authorised Inspection Scheme Application Was Accessed by an Unauthorised Third Party.

News | Quick Read

Hacking Group Moshen Dragon Targets Asian Telecommunication Companies

The Infection Vector Used By the Malicious Actors Remains Unknown at this Time.

News | Quick Read

Threat Actors Sent Malicious Emails Using Google SMTP Relay Service

In the First Two Weeks of April, Approximately 30,000 Emails Were Sent Using this Technique.

News | Quick Read

REvil Ransomware Makes a Comeback

The Ransomware Operation Has Emerged with a New Infrastructure and a Modified Encryptor.

News | Quick Read

Mental Health and Prayer Apps Do Not Meet Mozilla's Minimum Security Standards

User Security and Privacy Not a Priority for these Types of Apps.

News | Quick Read

Conti’s BazarLoader Replaced with Bumblebee Malware

Similar in Techniques with BazarLoader and IcedID, Bumblebee Is Distributed in Phishing Campaigns.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats