Heimdal
Latest Articles

Search Results:

Here are the guides and articles we found according to your search.

2681 results for ""

News | QUICK READ

FBI and CISA Issue Advisory on Rhysida Ransomware

The Ransomware Group Victimized at Least 62 Companies.

News | QUICK READ

Samsung UK Online Store Suffers Data Breach

Customers’ Personal Information, Compromised.

News | QUICK READ

Truepill Sued Over Data Breach Exposing 2.3 Million Customers

The Pharmacy Platform Is Blamed for Notifying Delay and Exposing Sensitive Data.

News | QUICK READ

Patch Now! New Intel CPU Vulnerability Impacts Desktop and Server Systems

The Flaw Enables Escalation of Privileges and Data Theft.

News | QUICK READ

SysAid Zero-Day Vulnerability Exploited by Threat Actors

The Hackers Leveraged the Vulnerability to Launch Clop Ransomware Attacks.

News | QUICK READ

35 Million LinkedIn Users' Information Shared on Hacking Forum

The Scraped Data Is a Blend of Real and Fabricated Details.

News | QUICK READ

Hackers Exploit Atlassian Vulnerabilities for Cerber Ransomware Attacks

Over 24,000 Confluence Instances Are Exposed Online and Could Be at Risk.

News | QUICK READ

Daixin Threat Group Claims Ransomware Attack on 5 Hospitals in Ontario

The Data Breach Impacts at Least 267,000 patients

Endpoint security | INTERMEDIATE READ

The Most Common Healthcare Cyberattacks

From Ransomware to DDoS, Discover the Most Frequent Threats that Target Healthcare Organizations.

News | INTERMEDIATE READ

Privilege Overreach, the Lurking PAM Security Threat

How Many Access Rights Do Your Users Have?

Patch management | INTERMEDIATE READ

How To Break The Metrics Mirage in Vulnerability Management

A Step-by-step Guide on Breaking Free From the Metrics Mirage.

News | QUICK READ

Non-Bank Financial Firms Are to Report Breaches in Less Than 30 Days

New FTC Regulations Refer to Security Breaches Involving Data of More Than 500 Consumers.

News | QUICK READ

Toronto Public Library Under Cyberattack

The Library Reported Experiencing Technical Difficulties with Online Services, WiFi, and Printing.

Access Management | INTERMEDIATE READ

Separation of Privilege (SoP) 101: Definition and Best Practices

What Is Privilege Separation and How Does It Improve IT Security?

News | QUICK READ

European Governments Email Servers Targeted by Threat Actors

The Hackers Used a Roundcube Zero-Day Vulnerability to Access the Servers.

News | QUICK READ

University of Michigan Faces Data Breach Impacting Many of its Affiliates

The Incident Exposed the Data of Students, Applicants, Alumni, Donors, Employees and More.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats