Today, organizations around the world are facing a perfect storm of inflation, smaller budgets, rising labor rates, and slower consumer demand. Against that backdrop, hackers are only getting more active. Businesses therefore have some difficult choices to make. Do you…
Tag: Heimdal Security Blog
Heimdal Announces New Partnership with ITHealth to Reinforce Cyber Security for NHS Organisations
We are proud to announce a new partnership with ITHealth, a trusted cyber security provider to the NHS. This partnership expands ITHealth’s offerings by integrating Heimdal’s advanced capabilities into the ITHealth Dashboard. By combining Heimdal’s threat protection and mitigation features with…
[Free & Downloadable] Cloud Security Policy Template
A well-structured Cloud Security Policy is no longer a luxury—it’s a necessity. To help you stay ahead, we’re offering a free, downloadable Cloud Security Policy Template designed to simplify your cloud security journey. In this article, we’ll explore why a…
GoIssue Phishing Tool Reveals Hackers Set Sights on GitHub Users
New phishing tool, GoIssue, takes email addresses from public GitHub profiles and sends mass phishing messages to GitHub users. The tool is specifically designed to target GitHub developers. Researchers warn that compromising developers’ credentials opens the gate for source code…
CISA Warns Most 2023 Top Exploited Vulnerabilities Were 0-Days
CISA warns that most of the top routinely exploited vulnerabilities during 2023 were zero-days. The FBI, the NSA, and 5 other cybersecurity authorities, like the UK’s National Cyber Security Centre (NCSC), were also partners in releasing The 2023 Top Routinely…
Top 10 Flexera Competitors and Alternatives for Patch Management
Flexera is a popular choice for gaining visibility across multiple clouds. But you’ll need a few more capabilities to manage all your IT devices and keep software up to date. IT asset management should cover everything from online platforms to…
What Is a Privileged Access Workstation?
A Privileged Access Workstation (PAW) is a secure computer built to safeguard sensitive tasks and privileged accounts. IT admins and security teams use PAWs to manage critical systems like the Active Directory. They also use them to access cloud services,…
Google To Make MFA Mandatory for Google Cloud in 2025
Google has recently announced that it plans to implement mandatory multi-factor authentication (MFA) on all Cloud accounts by the end of 2025. Google argues that MFA strengthens security without sacrificing a smooth and convenient online experience. It is reported that…
Threat Actors Hijack Windows Systems Using the New SteelFox Malware
A new malware named ‘SteelFox’ is actively used by threat actors to mine cryptocurrency and steal credit card data. The malware leverages the BYOVD (Bring Your Own Vulnerable Device) technique to obtain SYSTEM privileged on Windows machines. SteelFox is distributed…
How to Build a Healthy Patch Management Program
Any cybersecurity professional will know that regularly patching vulnerabilities is essential to protecting a network. Keeping apps, devices, and infrastructure up to date closes ‘back doors’ into your environment. But most cybersecurity professionals will also know there’s a big gap…
Why having too many cybersecurity point solutions is risky
“We have so many solutions now to solve single issues in our companies that the number of security solutions is becoming a risk itself” – Thomas Baasnes, Cybersecurity Director at Verdane. How many cybersecurity point solutions does your organization use?…
How to Build a Healthy Patch Management Program?
Any cybersecurity professional will know that regularly patching vulnerabilities is essential to protecting a network. Keeping apps, devices, and infrastructure up to date closes ‘back doors’ into your environment. But most cybersecurity professionals will also know there’s a big gap…
IntelBroker Claims Selling Nokia’s Source Code on BreachForums
Nokia is investigating a potential data breach after Serbian hacker IntelBroker claimed to sell the company’s source code. The attacker said he got the data by breaching one of the telecom giant’s third-party vendor. In his post on BreachForums, he…
Interlock Ransomware Specifically Targets FreeBSD Servers
Interlock ransomware operators created an encryptor meant to target FreeBSD servers. This is a practice that hackers often use in attacks on VMware ESXi servers and virtual machines. Now, the security researchers analyzed a sample of the FreeBSD ELF encryptor…
Heimdal and COOLSPIRiT Team Up to Strengthen UK Business Cybersecurity
LONDON, United Kingdom, 6 November 2024 – Heimdal, a leading provider of advanced cybersecurity solutions, and COOLSPIRiT, a UK-based expert in data management and IT infrastructure, are pleased to announce a strategic partnership to deliver cutting-edge security technologies to businesses…
Schneider Electric Investigates Cybersecurity Incident
Schneider Electric, a French multinational specializing in energy management and automation solutions, has confirmed a cybersecurity incident involving unauthorized access to one of its internal project execution tracking platforms. The breach was reported after a threat actor known as “Grep”…
10 Best Darktrace Alternatives & Competitors in 2024 [Features, Pricing & Reviews]
Looking for Darktrace alternatives can feel like hunting for missing puzzle pieces. Yes, Darktrace does a good job at detecting network threats. But these days, you must consider covering various protection layers to secure your system. Endpoint detection and response,…
Heimdal® Supports MSP Compliance Efforts with Fourth Consecutive ISAE 3000 SOC 2 Type II Certification
COPENHAGEN, Denmark, November 4, 2024 – Heimdal is proud to announce that it has once again secured the ISAE 3000 SOC 2 Type II certification, marking the fourth consecutive achievement of this prestigious accreditation, further solidifying its role in supporting…
EU Adopts New Cybersecurity Rules for Critical Infrastructure Under NIS2 Directive
The European Commission has adopted new cybersecurity rules for critical infrastructure across the EU, taking a major step toward enhancing digital resilience. This implementing regulation under the updated NIS2 Directive specifies cybersecurity measures for essential sectors and outlines when companies…
Microsoft Reveals Chinese Threat Actors Use Quad7 Botnet to Steal Credentials
Microsoft warns that Chinese threat actors steal credentials in password-spray attacks by using the Quad7 (7777) botnet, which is made up of hijacked SOHO routers. Quad7 is a botnet that consists of compromised SOHO routers. Cybersecurity specialists reported that the…