The Heimdal 5.1.0 RC (Release Candidate) dashboard update is now live, bringing a powerful lineup of improvements designed to make IT management faster, safer, and more intuitive. From pre-built scripting and compliance dashboards to simpler agent management and refined privilege…
Category: Heimdal Security Blog
Can Generative AI Be Weaponized for Cyberattacks?
Generative AI has emerged as one of the most powerful technologies of our era. Capable of producing realistic text, images, voice, and even code, these systems are revolutionizing industries. But while they fuel innovation and productivity, they also introduce an…
What is Managed ITDR? Key Definitions, Features, and Benefits
Key takeaways: MITDR explained: Managed ITDR combines identity threat detection with expert-led response. Why it matters: Get better protection and lower costs without building a full in-house team. What to look for: Prioritize behavioral monitoring, real-time response, and expert oversight…
Nearly 40% of 2024 Ransomware Payouts May Have Gone to Russia, China & North Korea
Ransomware victims paid an estimated $813 million in 2024. Nearly 40 percent of that may have gone to actors in Russia, China and North Korea, according to new analysis from cybersecurity firm Heimdal. Heimdal used recent telemetry, infrastructure tracing and…
Digital Warfare and the New Geopolitical Frontline
This article follows our recent article on the source of cybercrime attacks – read it here – we’re now exploring the global, commercial, and political dimensions of digital warfare. Key takeaways $100 billion in global cyber damages annually – equivalent…
Retail cybersecurity statistics for 2025
Cyber attacks against retail businesses have made headlines in 2025. Read this retail cybersecurity statistics rundown to understand more. For cyber criminals, the retail sector makes for a very attractive target. Retail businesses hold vast troves of valuable customer details,…
Is Your Tech Stack Killing Profitability? The Silent Bug Crippling MSP Growth
Many MSPs want to grow, but internal complexity often holds them back. In this guest article, Portland, a Heimdal partner, breaks down how fragmented systems and unclear value messaging can quietly erode profits, compliance, and trust – and how to…
Cyber Insurance Statistics for 2025
More and more businesses are taking out cyber insurance in 2025. Read our statistics rundown to understand why. Investing in cyber insurance is a smart move. In case of a cyber attack, it can reduce the financial burden of a…
Cybersecurity Has a Motivation Problem
I’ve worked in cybersecurity long enough to see that our biggest challenge isn’t a technical one, it’s motivational. We can build the strongest firewalls, design the smartest detection systems, and run endless awareness campaigns, but none of it matters if…
Agent Fatigue Is Real and Your Security Stack Is to Blame
Your senior analyst stares at alert number 47. It’s not even lunch. Another “suspicious login detected.” They switch to the third dashboard of the morning, cross-reference the user activity, and confirm what they already knew. Bob from accounting is working…
Heimdal 5.0.0 RC: RDP Protection, Ransomware Detection, and OS Deployment
Version 5.0.0 adds three major features for MSPs. a module that controls RDP access an improved ransomware detection engine a simpler way to deploy Windows over the network. Remote Access Protection (RAP): Block Unauthorized RDP Attempts RDP brute-force attacks remain…
Where Ransomware Profits Go and How to Cut Them Off
This article serves as a wake-up call. Even limited cooperation between registry bodies and law enforcement could cripple ransomware networks and raise the cost for cybercriminals. Ransomware payments hit $813 million in 2024 and my expectation is that they will…
ITDR vs EDR: What are the Key Differences?
Key takeaways: What are the main differences between ITDR, EDR, and other security solutions? How does ITDR provide effective protection against identity-based threats? How to effectively detect and respond to attacks. If there’s one thing the cybersecurity community loves, it’s an…
What Is Identity Threat Detection and Response?
Key insights: What is identity threat detection and response (ITDR)? What are the differences and similarities between ITDR and EDR? What are the alternatives to ITDR? Identity Threat Detection and Response (ITDR) is a comparatively new term in the cybersecurity…
Small Business Cybersecurity Statistics in 2025
Small businesses are a big target for cyber criminals. Read our small business statistics rundown to get a true picture of how the sector is being affected in 2025. Until relatively recently, cybercrime wasn’t perceived as a major risk for…
Follow the Money Blueprint For MSP Success (With Dave Sobel)
“If I was starting an MSP today, I am not sure I would start an MSP.” Now that’s a way to grab your attention when opening a podcast. Coming from Dave Sobel, someone who’s been an MSP owner, vendor executive,…
Digital doppelgängers: How sophisticated impersonation scams target content creators and audiences
Content creation is no longer niche. Over 50 million Americans earn income by making videos, livestreams, podcasts, or other digital media. Many are full-time creators, while others pursue it as a side hustle. Either way, having an online presence is…
Heimdal Joins the Tidal Cyber Registry with Its Extended Detection & Response (XDR) Solution
COPENHAGEN, Denmark, September 23, 2025 – We are proud to announce that our Extended Detection & Response (XDR) product has been officially listed on the Tidal Cyber Registry. This listing marks a significant milestone in Heimdal’s commitment to transparency, precision,…
Cyber Essentials Explained – And How Heimdal Helps You Pass and Stay Compliant
Cyber Essentials (CE) is the UK government‑backed baseline for stopping common, internet‑originating attacks. It comes in two levels – Cyber Essentials (self‑assessment, board sign‑off) and Cyber Essentials Plus (the same controls, plus independent testing) – and certification renews annually. See…
Top 10 Cybersecurity Companies in Europe
Over the last 10-15 years, the cybersecurity scene has gotten increasingly complex, as organizations adopt new technology and hackers evolve more innovative ways to target them. At the same time, data protection and compliance have become much more stringent across…