Heimdal
Latest Articles

Search Results:

Here are the guides and articles we found according to your search.

2681 results for ""

News | QUICK READ

Cybercriminals Launch a New Malware-as-a-Service: the 'Eternity Project'

Hackers Can Choose Between an Info-stealer, a Miner, a Worm Spreader, or Ransomware Tools. Or They Can Get Them All!

News | QUICK READ

BPFdoor Has the Capacity to Bypass Firewalls

A New Linux Malware Has Been Discovered That Shows Anti-Evasion Techniques.

News | QUICK READ

WordPress Websites Files and Databases Injected with Malicious JavaScript

The Malicious Campaign Allowed the Attacker the Ability to Redirect the Website Users to a Location of Their Choosing.

Endpoint security | QUICK READ

What Is RMM Software?

All You Need to Know about Remote Monitoring Management Software. A List of Open-Source RMM.

News | QUICK READ

South Asian Governments Targeted by Bitter APT Group

Based on Two Infection Chains, the Campaign Employes Malware with Remote File Execution Capabilities.

News | QUICK READ

Nerbian RAT Malware, New Threat on the Market

The New Remote Access Trojan Spreads Using COVID-19 and World Health Organization Themes.

News | QUICK READ

New Phishing-as-a-Service Toolkit Discovered

Cybercriminals May Use Frappo to Attack Major Financial Institutions and Online Retailers.

News | QUICK READ

Don’t Underestimate the DCRat Malware!

Despite Its Low Cost, the Malware Has a Wide Range of Capabilities.

News | INTERMEDIATE READ

Vendor Email Compromise (VEC) Explained

Definition, How VEC Attacks Work and Protective Measures.

News | QUICK READ

Transport for NSW Suffers Cyber Incident

Its Online Authorised Inspection Scheme Application Was Accessed by an Unauthorised Third Party.

News | QUICK READ

Threat Actors Sent Malicious Emails Using Google SMTP Relay Service

In the First Two Weeks of April, Approximately 30,000 Emails Were Sent Using this Technique.

News | QUICK READ

Conti’s BazarLoader Replaced with Bumblebee Malware

Similar in Techniques with BazarLoader and IcedID, Bumblebee Is Distributed in Phishing Campaigns.

News | QUICK READ

Medical Software Company Fined €1.5M for Exposing 490k Patients' Data

Dedalus Biology Was Fined by the French Data Protection Regulator (CNIL).

News | QUICK READ

The Tenet Case: Are Hackers Targeting the Healthcare Industry?

How Healthcare Can Stay Safe in this Cybersecurity Landscape.

News | QUICK READ

Threat-Hunting Journal April 2022 – Easter Edition

Top Malware(s) Detections: 1st of April – 28th of April

News | QUICK READ

Top Exploited Vulnerabilities in 2021 Revealed by Cybersecurity Firms

15 Common Flaws of Last Year Now Put Together in a List.

News | QUICK READ

How Cybersecurity Businesses Are Tackling the Ukraine War: CyberNews Exclusive Interview

CEO Morten Kjærsgaard Shared His View on the Cybersecurity Industry through the Russia vs. Ukraine Conflict.

Access Management | INTERMEDIATE READ

Authentication vs. Authorization: Key Differences and Types

Authentication and Authorization Concepts. Authentication & Authorization Methods.

News | QUICK READ

Millions of Laptops Impacted by Lenovo UEFI Firmware Vulnerabilities

If Abused, Hackers Could Deploy and Run Firmware Implants.

News | QUICK READ

A Zero-Click Vulnerability Is Exploited by NSO Spyware

The New Zero-Click iMessage Vulnerability May be Used to Install the Malware on iPhones.

News | QUICK READ

Lazarus Hackers Make Use of Fraudulent Crypto Apps, US Warns

The Threat Actors Use Social Engineering Techniques to Lure Victims to Download Malicious Apps.

News | INTERMEDIATE READ

What Is Email Spam?

How to Identify and Stop Spam Emails.

News | QUICK READ

Nordex Hit by Conti Ransomware

The Wind Turbine Developer Had to Shut Down Its IT Systems in Order to Prevent the Spread of the Attack.

Cybersecurity Basics | INTERMEDIATE READ

What Is Data Leakage?

Best Practices on Data Leakage Prevention.

News | QUICK READ

Hospital Robots Have Been Found to Have Critical Vulnerabilities

Researchers Named the Flaws Jekyllbot:5.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats