Heimdal
Latest Articles

Search Results:

Here are the guides and articles we found according to your search.

2681 results for ""

News | QUICK READ

Vulnerabilities Found in a WordPress Plugin Are Posing Remote Code Execution Risks

Multiple Vulnerabilities Discovered in a Popular WordPress Plugin Used to Upload Profile Photos Could Allow Attackers to Achieve Remote Code Execution.

News | QUICK READ

IndigoZebra APT Campaign Continues to Target Central Asia

The Afghan, Kyrgyz and Uzbek Governments Are All Thought to Have Been Targeted by the Same Cyber-Espionage Campaign.

News | QUICK READ

Babuk Locker Ransomware Tool Leaked Online

Hackers Can Use the Leaked Babuk Locker Ransomware Builder to Create their Own Ransomware Strain.

News | QUICK READ

Hades Ransomware Gang Claims More Victims

The Ransomware Group, Which Mainly Targets Billion-Dollar Companies, Has Claimed to Have Hit At Least Seven Victims Since Its Discovery in December 2020.

News | QUICK READ

Parcel Delivery Scam Targets Victims with Personalized Messages

A New Parcel Delivery Scam Is Using a New Twist. The Scammers Are Now Sending Out Personalized Messages to Potential Victims. 

News | QUICK READ

NFC Vulnerabilities Expose ATMs to Threat: a New Experiment Shows System Flaws

A New Research Regarding Card Readers System’s Flaws Revealed the Insecurity of ATMs and Point of Sales because of NFC Vulnerabilities.

News | QUICK READ

Cybersecurity Specialists Developed a Free Lorenz Ransomware Decryptor

Lorenz Ransomware Impacted Many Companies All Over the World Asking for Large Amounts of Money in Ransoms from Its Victims.

News | QUICK READ

Zero-Day Attack Generates My Book Live Exploit Leading to Devices Being Wiped Out

Behind the Last Week’ Mass-Wipe on Western Digital Devices Was a My Book Live Exploit Performed Through a Zero-Day Attack, New Reveals Show.

News | QUICK READ

DoubleVPN Servers, Logs, and Account Info Seized by Law Enforcement Agencies

The Servers and Customer Logs for DoubleVPN, a Double-Encryption Service Used by Threat Actors Were Recently Seized.

News | QUICK READ

Mercedes-Benz Data Breach Sheds Light on the Importance of Third-Party Risks

The Mercedes-Benz Data Breach Brings the Issue of Private Data Accidentally Becoming Accessible Into the Spotlight.

News | QUICK READ

SolarWinds Attack Cost Impacted Companies an Average of $12 Million

A New Survey Points Out That the Incident Also Motivated More Information Sharing Within the Industry and Improved Supply Chain Security.

News | QUICK READ

Most Wanted Cybercriminals: U.S. Secret Service Publishes the List of the Moment

U.S. Secret Service Agency Has Recently Brought to the Public’s Attention a List with the 10 Most Wanted Cybercriminals. Data Related to Two of Them Rewarded with $1 Million Each.

News | QUICK READ

LinkedIn Data of 700 Million People Leaked

According to Researchers, We Witness the Biggest Data Dumps in the History of LinkedIn.

News | QUICK READ

Microsoft Successfully Hit by A Dependency Hijacking Attack Again

Cybercriminals Are Using This Technique to Target Prominent Companies with Malicious Code.

News | QUICK READ

Microsoft Edge Vulnerability Could’ve Allowed Hackers to Steal Files

The CVE-2021-34506 Vulnerability Was Patched by the Tech Giant on June 24th As Part of Its Chromium Project Security Updates.

News | QUICK READ

Ransomware Attack on Wolfe Eye Clinic Exposes Data of 500k Patients

An Unauthorized Third-Party Attempted to Access the Company’s Computer Network and Then Restricted Access to Several Systems and Information.

News | QUICK READ

Hive Ransomware Gang Targets Software Provider Altus Group

The Exfiltrated Files Published on HiveLeaks Include Business Data and Documents, Argus Certificates, and Development Files.

News | QUICK READ

A Cisco ASA Vulnerability Is Actively Exploited

After the PoC Exploit Was Published on Twitter the Hackers Started to Exploit a Vulnerability Found in the Cisco ASA Devices.

News | QUICK READ

Windows Malware that Mines for Crypto ‘Crackonosh’ Used by Hackers to Infect Gamers’ PCs

Crackonosh Malware Is Hiding in Free Versions of Games Which Are Available to Download on Torrent Sites.

News | QUICK READ

Netfilter Rootkit Malware Infiltrates Into Microsoft’s Security Systems: the Gaming Community Targeted

A Malignant Driver, Known as Netfilter Rootkit Malware, Affects the Gaming Industry. Microsoft Admitted Signing It by Mistake Because of System Security Issues.

News | QUICK READ

Data Breach Involving Mercedes-Benz Exposes SSNs and Credit Card Numbers

The Mercedes-Benz Data Breach Exposed SSNs, Credit Card Numbers and Other Important Personal Information Belonging to Mercedes-Benz Customers and Potential Buyers.

News | QUICK READ

Nobelium Cybercriminals Compromise Microsoft Customer Support to Target Its Customers

The Tech Company Says the Attackers Managed to Access Data Stored on One of Its Employees’ Computers.

News | QUICK READ

Binance Helps Take Down Multiple Clop Ransomware Gang Members

The World-Class Blockchain Company Has Helped Law Enforcement in Their Effort to Identify and Ultimately Arrest Clop Ransomware Group Members.

News | QUICK READ

WD My Book Live NAS Devices Reformatted Remotely All Over the World

Western Digital My Book Live NAS Owners Urged to Disconnect their Devices from their Network to Avoid Data Deletion.

News | QUICK READ

Threat Actors Reinforce Spam Campaigns: New IcedID Banking Trojan Version Discovered

The IcedID Banking Trojan Dazzle the Cyberworld Once Again: Two New Phishing Campaigns Sweep Through Users. This Time, Threat Actors Promote a New Version.

News | QUICK READ

An Unusual File Attachment Is Being Used in Phishing Attacks

In an Attempt to Bypass Security Software Threat Actors Are Using the WIM Format.

News | QUICK READ

Atlassian Domain Flaws Could Have Led to Data Leakage and Account Control with Just One-click Exploit

A Research Conducted by Security Analysts Indicated Some Atlassian Domain Flaws That Could Have Led to Account Full Takeover.

News | QUICK READ

A Concerning Number of Third-Party Libraries From Apps Are Never Updated

Third-party Libraries Are Rarely Updated After Being Included in a Codebase, Even Though in Most Cases the Libraries Can Be Relatively Easily Updated.

News | QUICK READ

An Unpatched Flaw Existing in Linux Pling Store Apps Might Lead to Supply-Chain Attacks

The Critical Vulnerability Seems to be Affecting Pling-Based Free and Open-Source Software (FOSS) Marketplaces for the Linux Platform.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats