Heimdal
Latest Articles

Posts

Cybersecurity News | Quick Read

21 Billion Scam Calls Were Blocked by T-Mobile This Year

It Appears That an Average of 1.8 Billion Scam Calls Are Identified or Blocked Every Month.

Cybersecurity News | Quick Read

Meta Sues Threat Actors Responsible for the Phishing Scams Ran on Its Platforms

Over 39,000 Phony Websites Posing as Facebook, Messenger, WhatsApp, and Instagram Were Created by the Scammers.

Cybersecurity News | Quick Read

Zoho Zero-Day Exploited by State Threat Actors Since October, FBI Says

The Flaw Is Located in the Zoho’s ManageEngine Desktop Central Servers and Companies Are Advised to Apply the Existent Patch ASAP.

Cybersecurity News | Quick Read

Dridex Malware Installed With the Help of Log4j Vulnerability

The Log4j Vulnerability Is Apparently Being Used to Infect Windows Devices with the Dridex Trojan and Linux Devices with Meterpreter.

Cybersecurity News | Quick Read

The TellYouThePass Ransomware Reappeared After the Windows Log4j Attacks

The Vulnerability Is Used in Against Windows and Linux Devices Targeting a Critical Remote Code Execution Bug in the Apache Log4j Library.

Cybersecurity News | Quick Read

Spider-Man Fans, Watch Out! You Might Become the Next Victim in a New Phishing Campaign

Threat Actors Are Trying to Steal Their Banking Info via Phishing Links Based on the Newest Marvel Movie.

Cybersecurity News | Quick Read

The DarkWatchman Malware Was Found Hidden in Windows Registry

The New Malware It’s a Lightweight and Highly-Capable JavaScript RAT.

Cybersecurity News | Quick Read

Facebook Aka Meta Bans Seven Spy-For-Hire Entities

The Global Surveillance-for-Hire Industry Follows Intelligence Collection and Devices Compromising and Manipulation, Meta Says.

Access Management | Quick Read

Lenovo Laptops Vulnerable to Privilege Escalation Exploit

Users Urged to Upgrade to the Latest Available Version.

Patch management | Quick Read

Software Patching Statistics: Common Practices and Vulnerabilities

How Often and Fast Do Companies Really Apply Updates? How Dangerous (or Not) Are the Common Software Patching Behaviors?

Cybersecurity News | Quick Read

Phorpiex Botnet Is Becoming Harder to Disrupt

The Botnet Re-emerged With New Peer-to-Peer Command and Control Infrastructure.

Cybersecurity News | Quick Read

Hive Ransomware Wreaked Havoc in Four Months: Hundreds of Organizations Breached

Hive Emerged in June and Has Been Working as a Ransomware-as-a-Service Program.

Cybersecurity News | Quick Read

Monero Miners Injected in Log4j Through RMI

Threat Actors Have Switched from LDAP Callback URLs to RMI in Order to Increase Their Chances of Success.

Cybersecurity News | Quick Read

London Classified Ads Site Gumtree Experiences Data Breach Due to F12 Key

The Leaked Data Contained Email Addresses, Postcodes, GPS Location, and Other Sensitive Info.

Cybersecurity News | Quick Read

The Log4j Vulnerability Is Now Used by State-Backed Hackers

The Threat Actors Are Linked to Governments in China, Iran, North Korea, and Turkey.

Cybersecurity News | Quick Read

State-sponsored Threat Actors Steal Airline Data Using the Slack API

The Malicious Actor Behind the Attack Is Most Likely ITG17, Also Known as ‘MuddyWater,’ Cybersecurity Researchers Say.

Cybersecurity News | Quick Read

Cobalt Strike Is Being Installed by Emotet for Faster Attacks

This Comes Soon After Emotet Started to Test Installing Cobalt Strike Beacons on Infected Devices Instead of Their Regular Payloads.

Cybersecurity News | Quick Read

Espionage Hacking Campaign Is Targeting Telecom Operators

Middle Eastern and Asian Telecommunications and IT Service Companies Are Being Targeted.

Cybersecurity News | Quick Read

Anubis Android Malware Is Back and It Is Focusing on Financial Institutions

The Most Recent Operations Affects Roughly 400 Targets.

Cybersecurity News | Quick Read

A List of Vulnerable Products to the Log4j Vulnerability

Details on What Vendor Products Are Impacted by This Flaw.

Cybersecurity News | Quick Read

IIS Extensible Web Server Used to Steal Microsoft Exchange Credentials

Cybersecurity Researchers Found a Malicious IIS Web Server Software Called `Owowa’.

Cybersecurity News | Quick Read

New Ransomware Family Deployed in Log4Shell Attacks

Malicious Actors Are Trying to Deploy a Ransomware Family Dubbed Khonsari.

Cybersecurity News | Quick Read

Agent Tesla Spyware Used in Phishing Campaign

The Spyware Is Part of an Ongoing Phishing Effort that Uses Microsoft PowerPoint Slides.

Cybersecurity News | Quick Read

Most Recent iOS Updates from Apple Fix Remote Jailbreak Exploit for iPhones

Read On and Find Out what Other Vulnerabilities Have Been Fixed with the Latest Updates.

Cybersecurity Basics | Quick Read

The Ransomware Attack Suffered by Kronos May Cause Weeks of Downtime

It Seems that the Threat Actors Were Able to Infiltrate Kronos’ Systems and Encrypted Servers.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats