Heimdal
Latest Articles

Search Results:

Here are the guides and articles we found according to your search.

2681 results for ""

News | QUICK READ

Ransomware Attack Suffered by FinalSite Shuts Down Thousands of Websites

The Website Service Provider Has Been the Victim of an Attack that Disrupted Access to Websites for Thousands of Schools Worldwide.

News | QUICK READ

‘Elephant Beetle’ Threat Actor Is Stealing Money from Companies

A New Report Reveals Details about an Organized Financial-Theft Operation.

News | QUICK READ

$50 Million Lost to Fraudsters Posing as Broker-Dealers

A Large-Scale Internet-Based Fraud Scheme Made 70 Victims.

News | INTERMEDIATE READ

Heimdal™ Security Threat-Hunting Journal: End of the Year Wrap-up in Malware

Top 20 Malware(s) Detection: November 1st – January 1st, 2022

News | QUICK READ

DatPiff Data Breach Has an Impact on Millions of People, Have I Been Pwned Warns

Apparently Multiple Passwords of the Online Distribution Platform Have Been Put for Sale Online.

News | QUICK READ

Japanese Organizations Are Now the Targets of BlackTech APT Group

The Threat Actors Use the Flagpro Malware to Hack Japanese Firms.

News | QUICK READ

Malicious Telegram Installers Used to Spread Purple Fox Rootkit

The Researchers Discovered Numerous Malicious Installers Using the Same Attack Chain to Install the Same Purple Fox Rootkit Variant.

News | QUICK READ

A Data Breach Affected Broward Health

1.3 Million People Were Impacted.

News | QUICK READ

Watch Out! You Might Get Hacked When Copy-Pasting Commands from Webpages

The Command You Copy Might Not Be the Same as the Command You Paste.

News | QUICK READ

Curious Cat App Loses Control of Its Domain

The Popular Social Networking App Suffered a Series of Bizarre Events.

News | QUICK READ

Backup Error Results in Kyoto University Losing 77TB of Research Data

Some of the Lost Files Can No Longer Be Restored.

News | QUICK READ

Aged Domains: the Silent Danger to Cybersecurity

New Research Shows Why Dormant Domains Are More Risky than Newly Registered Ones.

News | QUICK READ

FinTech Company Impacted by Log4j Says No to Paying the Ransom

A Vulnerable Version of the Known Log4Shell Allowed Hackers to Breach the Firm’s System.

News | QUICK READ

Watch Out! RedLine Malware Steals Your Password from the Browser

RedLine Targets Chrome, Opera and Edge.

News | QUICK READ

An Increased Wave of eCh0raix Ransomware Attacks Hits QNAP NAS Devices

Threat Actors Intensified Their Activity Before Christmas.

Industry trends | SLOW READ

The Best Twitter Cybersecurity Accounts You Should Follow

Improve your online security one tweet at a time.

News | QUICK READ

2easy: A New Dark Web Marketplace for Stolen Data

The 2easy Marketplace Is Becoming a Significant Player on the Dark Web.

Cybersecurity Basics | SLOW READ

IT Asset Management - Everything You Need to Know About ITAM

IT Asset Management Is the Foundation of Any Smart Business Strategy.

News | QUICK READ

Zoho Zero-Day Exploited by State Threat Actors Since October, FBI Says

The Flaw Is Located in the Zoho’s ManageEngine Desktop Central Servers and Companies Are Advised to Apply the Existent Patch ASAP.

News | QUICK READ

Dridex Malware Installed With the Help of Log4j Vulnerability

The Log4j Vulnerability Is Apparently Being Used to Infect Windows Devices with the Dridex Trojan and Linux Devices with Meterpreter.

News | QUICK READ

Spider-Man Fans, Watch Out! You Might Become the Next Victim in a New Phishing Campaign

Threat Actors Are Trying to Steal Their Banking Info via Phishing Links Based on the Newest Marvel Movie.

News | QUICK READ

The DarkWatchman Malware Was Found Hidden in Windows Registry

The New Malware It’s a Lightweight and Highly-Capable JavaScript RAT.

News | QUICK READ

Facebook Aka Meta Bans Seven Spy-For-Hire Entities

The Global Surveillance-for-Hire Industry Follows Intelligence Collection and Devices Compromising and Manipulation, Meta Says.

News | QUICK READ

Lenovo Laptops Vulnerable to Privilege Escalation Exploit

Users Urged to Upgrade to the Latest Available Version.

Patch management | INTERMEDIATE READ

Software Patching Statistics: Common Practices and Vulnerabilities

How Often and Fast Do Companies Really Apply Updates? How Dangerous (or Not) Are the Common Software Patching Behaviors?

News | QUICK READ

Phorpiex Botnet Is Becoming Harder to Disrupt

The Botnet Re-emerged With New Peer-to-Peer Command and Control Infrastructure.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats