Heimdal
Latest Articles

Search Results:

Here are the guides and articles we found according to your search.

2681 results for ""

News | QUICK READ

Avaddon Ransomware Hits Insurance Giant AXA

The French Insurer Revealed That One of Its Asian Subsidiaries Was Hit by A Ransomware Attack Over the Weekend, After Dropping Support for Ransom Payments.

News | QUICK READ

Credit Card Information Stolen from Seniors After Herff Jones Got Hacked

The Attackers Hacked the Seniors’ Payment Information and Ran Up Unauthorized Charges on Their Credit Cards.

News | INTERMEDIATE READ

Advanced Threat Protection ATP: What It Is and How You Can Achieve It

Advanced Threat Protection Is a Complex Set of Practices That Keep Your Enterprise Safe. Here’s Everything You Need to Know About It.

Cybersecurity Basics | QUICK READ

Taking Host Intrusion Prevention System (HIPS) Apart

What Is Host Intrusion Prevention System (HIPS)? How HIPS Works and Why You Need It?

News | QUICK READ

Heimdal™ AI Discovers a Complex Phishing Cryptocurrency Scam Campaign

The Cryptocurrency Scam Operators Have Been Preparing Their Malicious Campaign Months in Advance. Victims Defrauded of 0.3 ETH and Face Long-term Risks as Well.

Cybersecurity Basics | QUICK READ

What Is Software Deployment: Definition, Specific Activities, Challenges and Advantages

Software Deployment: Initial Installs, Updates and Security Patches. Learn Why They’re Important for Your Company’s Cybersecurity!

News | QUICK READ

Finastra Ransomware Attack

An In-Depth Look at the Situation. How Did Finastra Survive the Attack Without Paying?

News | QUICK READ

Everything You Need to Know About the WestRock Ransomware Attack

Stages and Data to Date. How Attacks on Operational Technology Became the Next Cyber Boundary.

News | QUICK READ

Blackbaud Ransomware Attack 101

How the Attack Affected a Large Number of Industries. What do You need to Know About It?

Cybersecurity Basics | QUICK READ

What Is SSL Vulnerability In Computer Network Science?

Vulnerabilities of the SSL/TLS Protocol. Most Common SSL Attacks.

Cybersecurity Basics | INTERMEDIATE READ

What Is Bandwidth Usage and How Can You Monitor It?

Types of Bandwidth: Pros and Cons. How to Reduce Bandwidth Usage on Your Networks.

Cybersecurity Basics | QUICK READ

What Is Desktop Configuration?

The Importance of Desktop Configuration. Desktop Security Best Practices.

News | INTERMEDIATE READ

Everything You Need to Know About the 2021 Facebook Data Breach

Why the 2021 Facebook Data Breach Is A Serious Matter and How You Can Protect Your Personal Information.

Advanced malware researches | SLOW READ

A Technical Analysis of the Mirai Botnet Phenomenon

Mirai Botnet Attack and Infection Methodologies

Cybersecurity Basics | INTERMEDIATE READ

Point Products vs Complete Cyber Security Suite: Which Strategy Is Better for Ensuring the Safety of Your Business?

How To Ensure the Safety of Your Business? What Cybersecurity Approach Is Perfect for You?

Cybersecurity Basics | QUICK READ

What Is a SCEP Server?

Defining the SCEP Server. How Does SCEP Protocol Work?

Cybersecurity Basics | QUICK READ

What Is SNMP In Computer Network Science?

Defining SNMP Components. SNMP Protocol Data Units.

Cybersecurity Basics | QUICK READ

What Is WLC in Networking and Why Is It Important?

How Does WLC Work. Benefits of Using a Wireless LAN Controller.

News | QUICK READ

600,000 Stolen Credit Cards Leaked Following the Swarmshop Hack

The Data Leak Seems To Be Containing Records of the Entire Swarmshop Community and All the Stolen Card Data Traded on the Forum.

Cybersecurity Basics | INTERMEDIATE READ

On AI Neural Network - How It Works, History, Application, Learning Strategies

AI Neural Network Is Like a Digital Model of A Brain. Find Out How It Can Take Us Further.

Cybersecurity Basics | QUICK READ

What Is Residual Risk in Information Security?

The Importance of Residual Risk. How To Manage your Residual Risk?

Cybersecurity Basics | QUICK READ

What Is A Packet Sniffer and How Does It Work?

Benefits of Using A Packet Sniffer. Packet Sniffing Best Practices.

News | QUICK READ

Hundreds of OnlyFans Creators had Their Adult Content Published Online

279 OnlyFans Creators Folders Were Leaked, with One of Them Having Over 10GB of Videos and Photos.

Cybersecurity Basics | QUICK READ

What Is Registry Management and Why Is It Important?

Registry Management Lifecycle. Advantages of Using Registry Management.

Cybersecurity Basics | QUICK READ

What Is ITSM Software and How Does It Work?

Understanding ITSM Processes. Benefits of Using ITSM Software.

Cybersecurity Basics | QUICK READ

What Is a HAR File and Why Is It Important in Cybersecurity

HAR File Definition and Purpose. How to Generate or Open HAR Files.

News | QUICK READ

What Is Broken Object Level Authorization (BOLA)?

Impact of a Broken Object Level Authorization (BOLA) in Cybersecurity. All You Need to Know to Stay Safe.

Cybersecurity Basics | QUICK READ

What Is Network Monitoring?

Why Use Network Monitoring? What Are the Benefits?

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats