Heimdal
Latest Articles

Posts

News | Quick Read

IT and Software Consultancy Company Globant Got Hacked

The Lapsus$ Extorsion Group Leaked 70GB of Stolen Data.

News | Quick Read

Election Officials Warned by the FBI of Credential Phishing Campaigns

Mitigations to Reduce the Risk of Compromise.

News | Quick Read

Mars Stealer: a New Popular Malware on the Cyberthreat Landscape

OpenOffice Ads on Google Are Leveraged to Distribute It.

News | Quick Read

Shutterfly Hit by Data Breach

It Seems that Conti Ransomware Was Behind the Attack.

News | Quick Read

Threat Hunting Journal – March 2022 E.O.M Edition

Top Malware(s) Detection: 1st of March – 28th of March

News | Quick Read

SunCrypt Ransomware Still Alive in 2022

The RaaS Seems to Have Developed a New and Improved Version of Their Strain.

News | Quick Read

Threat Actors Hijack Email Reply Chains on Vulnerable Exchange Servers to Deliver IcedID Malware

Energy, Healthcare, Law, and Pharmaceutical Sectors Were Allegedly Targeted in the Latest Wave of Cyberattacks.

News | Quick Read

Purple Fox Threat Actors Leverage New FatalRAT Version

They Use Improved Evasion Methods.

News | Quick Read

V8 Vulnerability Hits Chrome and Edge

The Bug Is Located in the JavaScript Engine Dubbed V8.

News | Quick Read

New Korplug Variant Discovered

The Variation of the PlugX Remote Access Tool Was Named Hodur.

Cybersecurity Basics | Quick Read

What Is FOSS Software? Definition, Usage, and Vulnerabilities

FOSS (Free Open-Source Software) vs. OSS (Open-Source Software) vs. CSS (Closed-Source Software)

News | Quick Read

Social Engineering Attacks Target Morgan Stanley Client Accounts

Hackers Managed a Data Breach through Vishing.

News | Quick Read

A Honda Vulnerability Allows Hackers to Use a Replay Attack

The Flaw Could Be Used to Unlock and Start Your Vehicle.

Cybersecurity Basics | Quick Read

What Is Data Loss Prevention and How You Can Approach DLP Security

DLP Security Ensures the Integrity of Your Company’s Data. Here’s What You Need to Know About It.

Cybersecurity Basics | Quick Read

Most Common Cyber Threats for Businesses

Top Cybersecurity Threats every Company Should Know

News | Quick Read

ISPs and Diplomats Targeted by New Mustang Panda Hacking Campaign

The Threat Actors Group Is Leveraging a New Version of Korplug.

News | Quick Read

Russian Cybercrime Market Owner Added to FBI’s Most Wanted List

Igor Dekhtyarchuk Was Accused in the Eastern District of Texas of Operating a Cybercrime Marketplace.

News | Quick Read

10GB of Data Belonging to Nestlé Exposed [Updated]

The Anonymous Hacking Group Was Apparently Behind the Attack.

News | Quick Read

Microsoft Source Code Allegedly Leaked [Updated]

The Lapsus$ Hacker Group Claims to Have Obtained Bing, Cortana, and Other Microsoft Projects’ Source Code From an Azure DevOps Server.

News | Quick Read

Strengthening Your Online Security Ahead of Possible Russian Cyberattacks

The White House Issued a Warning to All US Organizations Recommending, among Others, Multi-factor Authentication.

News | Quick Read

100,000 Google Play Users Targeted by Android Password Stealing Malware

Think Twice when Installing Craftsart Cartoon Photo Tools!

News | Quick Read

New Phishing Toolset Allows for Browser in the Browser (BitB) Attacks

Hackers May Now Generate Successful Single Sign-On Phishing Login Forms Using Bogus Chrome Browser Windows.

News | Quick Read

Diavol Ransomware Receives Free Decryptor

Use the Free Decryption Tool to Recover Your Files!

News | Quick Read

US Critical Organizations Alerted of Threats to SATCOM Networks by CISA and FBI

What Should SATCOM Network Providers and Customers Do?

Cybersecurity Basics | Quick Read

Network Security 101 – Definition, Types, Threats, and More

Network Security Is a Multifaceted Process. Here’s Everything You Need to Know About It.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats