Heimdal
Latest Articles

Search Results:

Here are the guides and articles we found according to your search.

2681 results for ""

News | QUICK READ

New Korplug Variant Discovered

The Variation of the PlugX Remote Access Tool Was Named Hodur.

Cybersecurity Basics | INTERMEDIATE READ

What Is FOSS Software? Definition, Usage, and Vulnerabilities

FOSS (Free Open-Source Software) vs. OSS (Open-Source Software) vs. CSS (Closed-Source Software)

News | QUICK READ

Social Engineering Attacks Target Morgan Stanley Client Accounts

Hackers Managed a Data Breach through Vishing.

News | QUICK READ

A Honda Vulnerability Allows Hackers to Use a Replay Attack

The Flaw Could Be Used to Unlock and Start Your Vehicle.

Cybersecurity Basics | INTERMEDIATE READ

What Is Data Loss Prevention and How You Can Approach DLP Security

DLP Security Ensures the Integrity of Your Company’s Data. Here’s What You Need to Know About It.

News | QUICK READ

ISPs and Diplomats Targeted by New Mustang Panda Hacking Campaign

The Threat Actors Group Is Leveraging a New Version of Korplug.

News | QUICK READ

Russian Cybercrime Market Owner Added to FBI’s Most Wanted List

Igor Dekhtyarchuk Was Accused in the Eastern District of Texas of Operating a Cybercrime Marketplace.

News | QUICK READ

Microsoft Source Code Allegedly Leaked [Updated]

The Lapsus$ Hacker Group Claims to Have Obtained Bing, Cortana, and Other Microsoft Projects’ Source Code From an Azure DevOps Server.

News | QUICK READ

New Phishing Toolset Allows for Browser in the Browser (BitB) Attacks

Hackers May Now Generate Successful Single Sign-On Phishing Login Forms Using Bogus Chrome Browser Windows.

News | QUICK READ

Diavol Ransomware Receives Free Decryptor

Use the Free Decryption Tool to Recover Your Files!

Cybersecurity Basics | INTERMEDIATE READ

Network Security 101 – Definition, Types, Threats, and More

Network Security Is a Multifaceted Process. Here’s Everything You Need to Know About It.

News | QUICK READ

SolarWinds Issues Warning on Possible Web Help Desk Instances Attacks

The Advisory Is Meant to Alert Clients about the Possible Exploitation of a Potential Security Flaw.

News | QUICK READ

Over 500 Domains Were Used in Phishing Operation to Steal Credentials

The Phishing Campaign Is Focusing on Gathering Credentials of Naver Users, According to Researchers.

News | QUICK READ

New Linux Botnet Discovered

The Botnet Is Exploiting the Log4J Vulnerability.

News | QUICK READ

Bogus Valorant Cheat Lures on YouTube Infect Users with RedLine Stealer Malware

RedLine Malicious Program Is One of the Most Widely Used Password-stealing Malware Infections.

News | QUICK READ

Ubisoft Was the Victim of a Cyber Security Incident

The Malicious Actor Lapsus$ Could Be Behind the Attack.

Cybersecurity Basics | QUICK READ

Proxy vs VPN - Differences and Advantages

Learn How They Can Help You Achieve Online Privacy and What’s Best for Your Company

News | QUICK READ

BazarBackdoor Malware Distributed via Corporate Website Contact Forms

Threat Actors Employ Different Techniques to Bypass Detection.

News | QUICK READ

Ukraine's IT Army Targeted by Disguised Malware

The Malicious Campaign Works by Infecting the People Wanting to Help With Password-Stealing Trojans.

News | INTERMEDIATE READ

SaaS Security Explained: Definition and Best Practices

Security of SaaS Should Be a Top Priority for Your Business. Do You Know How to Defend Your Assets?

News | QUICK READ

Your Biometric Data in Danger of Being Exploited by Hackers

Find Out How They May Maliciously Use It.

News | QUICK READ

Zero-Click Flaws Discovered in UPS Devices

The ‘TLStorm’ Vulnerabilities Could Allow Attackers to Cause Both Cyber and Physical Damage by Affecting Critical Infrastructure.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats