Heimdal
Latest Articles

Search Results:

Here are the guides and articles we found according to your search.

2681 results for ""

Access Management | INTERMEDIATE READ

What Is User Provisioning?

Definition, Benefits, Use Cases, Best Practices and More.

News | QUICK READ

APT43: A New Cyberthreat From North Korea

The Group Uses Cybercrime to Fund Espionage Operations.

News | QUICK READ

The U.K. Police Hunts Cybercriminals with Fake DDoS-as-a-service Sites

The Fake DDoS-as-a-service Sites Lured Thousands of Hackers.

News | QUICK READ

Clop Ransomware Exploits Zero-Day Vulnerability to Breach Crown Resorts

More and More Organizations Compromized as a Result of GoAnywhere Vulnerability.

News | QUICK READ

Warning! 14 Million Customers Impacted by Latitude Financial`s Data Breach

Employee’s Stolen Login Credentials Opened the Gate for Threat Actors.

News | QUICK READ

Heimdal® Leading the Cyber-Defense Avant-Garde with Revolutionary Hybrid SOC – CSIRT Solution

Calling upon Cybersecurity Unity with Threat Hunting and Action Center

News | QUICK READ

Heimdal® Announces Revolutionary Cybersecurity Platform

A New Era in Cybersecurity Is About to Begin

News | QUICK READ

The U.S. Government Restricts the Use of Spyware, White House Says

An Executive Order Has Been Signed by President Biden.

News | QUICK READ

MacStealer MacOS Malware Steals Passwords from iCloud Keychain

The Info-Malware Uses Telegram as a Command-and-Control Platform to Exfiltrate Data.

News | QUICK READ

Parts of Twitter`s Source Code Were Leaked on GitHub, According to Elon Musk

The Incident Could Lead to Vulnerabilities Exploits and Users Data Leakage.

News | QUICK READ

Avoiding the Pitfalls of Tax Season: Philadelphia Warns Against Sophisticated Phishing Attacks

Philadelphia Takes Action to Protect Citizens from Tax-Based Phishing Scams.

News | QUICK READ

Food Giant Dole, Victim of a Ransomware Attack [Updated]

The Company Shut Down Its Production Plants in North America.

News | QUICK READ

Chinese Hackers Infiltrate Middle Eastern Telecom Companies

The Intrusion Set Was Associated with Operation Soft Cell.

Ransomware | QUICK READ

The Most Prevalent Types of Ransomware You Need to Know About

Understanding the Most Frequently Used Types of Ransomware Is More Important than Ever.

News | QUICK READ

Enhanced Version of the BlackGuard Stealer Spotted in the Wild

The Newly Added Features Make the Malware More Dangerous.

News | QUICK READ

The City of Toronto, Among This Week’s Victims of GoAnywhere Attacks

Other Victims Are UK’s Virgin Red and Pension Protection Fund.

News | QUICK READ

37M Subscribers Streaming Platform Lionsgate Exposes User Data

The Leak Exposed IP Addresses, Devices, Operating Systems and More.

News | QUICK READ

Threat Actors Use the MageCart Malware in New Credit Card Data Stealing Campaign

The Campaign Targets eCommerce Websites Using WooCommerce.

News | QUICK READ

Another Fake ChatGPT Extension Found in Google Chrome Store

Fake ChatGPT Extension Hijackes Facebook Accounts Turning Them into “Lily Collins” Clones.

News | QUICK READ

ShellBot DDoS Malware Targets Poorly Managed Linux Servers

Attackers Use Port Scanning and Exploit Weak Credentials to Install the Malware.

News | QUICK READ

Another GoAnywhere Attack Affects Japanese Giant Hitachi Energy

Hitachi Energy Confirms the Data Breach.

News | QUICK READ

New PowerMagic and CommonMagic Malware Used by Threat Actors to Steal Data

The Frameworks Continue to Wreak Havoc in the Russian-Ukrainian Conflict Zone.

News | QUICK READ

Researchers Reveal Insights into CatB Ransomware's Advanced Evasion Methods

The CatB Ransomware Operation Uses a Special Technique to Evade Detection and Launch Payload.

News | QUICK READ

Ferrari Announces Data Breach. Customers Risk Data Leakage

The Breach Did Not Impact the Operational Functions of the Company.

News | QUICK READ

Banking Trojan Mispadu Found Responsible for 90,000+ Credentials Stolen

Researchers Reveal: Latin American Banks Targeted by Mispadu Banking Trojan.

News | QUICK READ

A Cancer Patient's Fight for Justice Against a Hospital Ransomware Attack

After Releasing Susceptible Records Online, the Victim Was Offered Two Years of Credit Monitoring.

News | QUICK READ

Emotet Malware Spreads Out Through Malicious Microsoft OneNote Attachments

Threat Actors Use Reply-Chain Emails to Spoof Guides, Invoices, or Job References.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats