Tag: Heimdal Security Blog

ITDR vs EDR: What are the Key Differences?

Key takeaways: What are the main differences between ITDR, EDR, and other security solutions? How does ITDR provide effective protection against identity-based threats? How to effectively detect and respond to attacks. If there’s one thing the cybersecurity community loves, it’s an…

What Is Identity Threat Detection and Response?

Key insights: What is identity threat detection and response (ITDR)? What are the differences and similarities between ITDR and EDR? What are the alternatives to ITDR? Identity Threat Detection and Response (ITDR) is a comparatively new term in the cybersecurity…

Small Business Cybersecurity Statistics in 2025

Small businesses are a big target for cyber criminals. Read our small business statistics rundown to get a true picture of how the sector is being affected in 2025. Until relatively recently, cybercrime wasn’t perceived as a major risk for…

Top 10 Cybersecurity Companies in Europe

Over the last 10-15 years, the cybersecurity scene has gotten increasingly complex, as organizations adopt new technology and hackers evolve more innovative ways to target them. At the same time, data protection and compliance have become much more stringent across…

UK Cybersecurity Statistics for 2025

As Dame Margeret Beckett, a member of the House of Lords recently put it: “The UK has the dubious distinction of being one of the world’s most cyber-attacked nations”. Calculating exactly how many cyber attacks there are per country is…

Password breach statistics in 2025

At Heimdal we’re constantly monitoring the latest industry alerts, media reports, academic research and government data to keep track of password breaches. It’s a crucial part of our work, and means we can advise our customers on emerging threats.  To…

European Organizations Hit by Sophisticated PDF Editor Malware Campaign

TamperedChef malware disguised as free productivity software infected 35 endpoints across multiple countries using advanced obfuscation techniques Heimdal’s Discovery Heimdal Security’s Managed Extended Detection and Response (MXDR) team has identified 35 confirmed infections linked to a malware campaign dubbed TamperedChef.…

Fortinet VPNs Under Coordinated Attack

Time for your Weekly Cyber Snapshot with Adam Pilton, former Cybercrime Investigator, currently Cybersecurity Advisor. The five major cyber stories this week go from North Korea’s cyber playbook getting leaked to the silent burnout creeping up on MSPs. Let’s go.…

Complete Protection Guide for Cybersecurity in Energy and Utilities

In May 2023, hackers struck 22 Danish energy companies simultaneously. The coordinated attack breached Denmark’s critical infrastructure in just days, potentially linked to Russia’s Sandworm group. Attackers exploited firewall vulnerabilities with surgical precision, forcing energy companies to disconnect from the…

Your Protection Guide For Cybersecurity in Manufacturing

Cybersecurity in manufacturing businesses is unique. The sector faces several challenges that other industries don’t have to contend with. And the impacts of any disruption are unusually high.  What is more, manufacturers are increasingly finding themselves in the crosshairs of…

Attack Surface Management Software: Top 10 Vendors

Key Takeaways: What is attack surface management? Why is attack surface management important? What are the best ASM vendors? Over the last few years, attack surface management (ASM) has become an increasingly common category within cybersecurity. The term describes a…