COMMUNICATION AND PR OFFICER

We’re always open to other security experts weighing in on cybersecurity topics.

If you think you have something valuable to contribute to our blog, we welcome your ideas.

Before you send us a pitch, please note the following:

  • We are busy people, so it may take up to one week for you to get an answer after the initial email. Be patient, we’re getting to you soon.
  • The Heimdal Security blog is the winner of the Most Educational Blog Award Europe in 2016, and we focus on writing well-documented and helpful content for our readers. Therefore, only top-quality guest posts will be accepted. If your content is not up to par, we don’t have time to do any major edits or give you extensive feedback, you will just get rejected.
  • Your content also needs to be original (not published anywhere else before). Also, and obviously, your content cannot infringe on any copyright laws.
  • We will also retain the copyright to all content you publish with us (you can’t resubmit it someplace else).

How to proceed?

First, send us an email at guestauthors@heimdalsecurity.com, with one or a few topics you can confidently write about. Think of how you are helping our readers and the community protect themselves better from cyber-threats with the info you are bringing to the table.

Before pitching any idea, do a quick search on our blog and make sure the topic is not something we already covered. Also, do not send us completed articles. Unsolicited manuscripts will be ignored! We need to approve the topic idea first.

If you’re accepted…

Then make sure you edit your piece according to the following guidelines before you send us the completed version.

  • Recommended length: between 1000 and 1500 words.
  • Personal opinions, stories, and experience are always more valuable to us than general information compiled from online sources.
  • Don’t make any claims or use facts and figures without mentioning the source for your data.
  • Graphs and charts that accompany your content are more than welcome and encouraged.
  • We can include one link to your website or blog in your author bio, so don’t try to include links throughout the text, as we’ll remove them anyway.

Looking forward to your contributions and to working together!

Best,

The Heimdal Security Content team.

Comments

Hi
I have Sodinokibi ransomware, i have removed it but data are crypted

Any help

chandra prakash Kedia on September 14, 2019 at 8:09 pm

Hello my system is infected with 2 ransomware.

.meds, .kvag can anyone please help me how to remove them and recover all my data please help.

my pc infected with .meds ransomeware, pls help me to decript my files

Hello,
yesterday before all my files got encrypted and by “herad”.
The extention is “.herad”. The names of the files are not changed, it only adds the “.herad” extention after the name and the original extention.
I couldn’t find any decrypt tool and any info about this Ransomware.
please help me about this problem.

Dear Ioana,

how to decrypt files which are infected by .bufas ransomware virus? please help.

thanks

Hi my files are infected by .DOCX Ransomware. are there any decryptor for that virus.

please help me.

Thanks

hello,
our data infected with extention .help

can you help us?

ransomware attack .neras virus pls help and send data recover tool

I was infected 3 times on all files. I did not know how to take my antivirus. how can i recover a virus file with nano. djvuq. GKZEX. there are 3 different viruses in a single picture. please help. I’m waiting for the mail

Hi
i need help my computer is infected by heroset ransomware all my data is encrypted
ID: Tdhr8xd3bjhXtW6CtWMc8DwZ3a9TtqOXFOoESWMI
MACs: 48:0F:CF:35:7F:80, 00:FF:0C:3A:F5:D6
thank you

My Laptop was infected with Ferosas Ransomware, All Files were encrypted.
Please tell me about the appropriate decryption tool.
THANKS

Hi ,
is there any way to encrypt entire csv files one or tow column or strings .

hello I want security services for my organization

Hello Seth! Thank you for your interest in our services. For business needs, we have Thor Enterprise, our corporate product, which provides proactive and reactive security in one complete package for leading-edge endpoint protection. You can find out more details about our security product here: https://heimdalsecurity.com/en/products/thor-enterprise and do not hesitate to contact us if you have any question. Thanks!

medam
my photos were attacked by ramsomware and convert in to verasto file type plz how to decrypt my file as it is help me soon

Hello,
My system is affected with ransomware and my files have been locked with file extension .tuuqmjqseh.

You are requested to suggest any decryption tools for unlocking the same

Hello there! Sorry to hear that! We suggest using this link and upload your file to better identify the type of ransomware you’ve been infected with: https://id-ransomware.malwarehunterteam.com/ After that, you can read this article and see if there’s any free decryptor available for it: https://heimdalsecurity.com/blog/ransomware-decryption-tools/. Thanks and hope this helps.

Hello! So sorry to hear that! Unfortunately, we don’t know of any decryptor available for this ransomware strain. Maybe it can help this guide: https://www.2-spyware.com/remove-grovas-ransomware.html Stay safe!

In which country do you provide security services?

Miriam Cihodariu on March 22, 2019 at 3:11 pm

Hello Alex,

Thank you for stopping by. Our security products (software solutions) can be used regardless of location.

Leave a Reply

Your email address will not be published. Required fields are marked *

GO TO TOP