Google has recently announced that it plans to implement mandatory multi-factor authentication (MFA) on all Cloud accounts by the end of 2025. Google argues that MFA strengthens security without sacrificing a smooth and convenient online experience. It is reported that…
Tag: Heimdal Security Blog
Threat Actors Hijack Windows Systems Using the New SteelFox Malware
A new malware named ‘SteelFox’ is actively used by threat actors to mine cryptocurrency and steal credit card data. The malware leverages the BYOVD (Bring Your Own Vulnerable Device) technique to obtain SYSTEM privileged on Windows machines. SteelFox is distributed…
How to Build a Healthy Patch Management Program
Any cybersecurity professional will know that regularly patching vulnerabilities is essential to protecting a network. Keeping apps, devices, and infrastructure up to date closes ‘back doors’ into your environment. But most cybersecurity professionals will also know there’s a big gap…
Why having too many cybersecurity point solutions is risky
“We have so many solutions now to solve single issues in our companies that the number of security solutions is becoming a risk itself” – Thomas Baasnes, Cybersecurity Director at Verdane. How many cybersecurity point solutions does your organization use?…
How to Build a Healthy Patch Management Program?
Any cybersecurity professional will know that regularly patching vulnerabilities is essential to protecting a network. Keeping apps, devices, and infrastructure up to date closes ‘back doors’ into your environment. But most cybersecurity professionals will also know there’s a big gap…
IntelBroker Claims Selling Nokia’s Source Code on BreachForums
Nokia is investigating a potential data breach after Serbian hacker IntelBroker claimed to sell the company’s source code. The attacker said he got the data by breaching one of the telecom giant’s third-party vendor. In his post on BreachForums, he…
Interlock Ransomware Specifically Targets FreeBSD Servers
Interlock ransomware operators created an encryptor meant to target FreeBSD servers. This is a practice that hackers often use in attacks on VMware ESXi servers and virtual machines. Now, the security researchers analyzed a sample of the FreeBSD ELF encryptor…
Heimdal and COOLSPIRiT Team Up to Strengthen UK Business Cybersecurity
LONDON, United Kingdom, 6 November 2024 – Heimdal, a leading provider of advanced cybersecurity solutions, and COOLSPIRiT, a UK-based expert in data management and IT infrastructure, are pleased to announce a strategic partnership to deliver cutting-edge security technologies to businesses…
Schneider Electric Investigates Cybersecurity Incident
Schneider Electric, a French multinational specializing in energy management and automation solutions, has confirmed a cybersecurity incident involving unauthorized access to one of its internal project execution tracking platforms. The breach was reported after a threat actor known as “Grep”…
10 Best Darktrace Alternatives & Competitors in 2024 [Features, Pricing & Reviews]
Looking for Darktrace alternatives can feel like hunting for missing puzzle pieces. Yes, Darktrace does a good job at detecting network threats. But these days, you must consider covering various protection layers to secure your system. Endpoint detection and response,…
Heimdal® Supports MSP Compliance Efforts with Fourth Consecutive ISAE 3000 SOC 2 Type II Certification
COPENHAGEN, Denmark, November 4, 2024 – Heimdal is proud to announce that it has once again secured the ISAE 3000 SOC 2 Type II certification, marking the fourth consecutive achievement of this prestigious accreditation, further solidifying its role in supporting…
EU Adopts New Cybersecurity Rules for Critical Infrastructure Under NIS2 Directive
The European Commission has adopted new cybersecurity rules for critical infrastructure across the EU, taking a major step toward enhancing digital resilience. This implementing regulation under the updated NIS2 Directive specifies cybersecurity measures for essential sectors and outlines when companies…
Microsoft Reveals Chinese Threat Actors Use Quad7 Botnet to Steal Credentials
Microsoft warns that Chinese threat actors steal credentials in password-spray attacks by using the Quad7 (7777) botnet, which is made up of hijacked SOHO routers. Quad7 is a botnet that consists of compromised SOHO routers. Cybersecurity specialists reported that the…
Microsoft Warns: Midnight Blizzard’s Ongoing Spear-Phishing Campaign with RDP Files
An ongoing spear-phishing campaign is affecting a variety of companies, including governmental agencies. According to Microsoft, the Russian APT group Midnight Blizzard (also known as APT29, UNC2452, and Cozy Bear) is behind the attacks. The same threat actors breached the…
How to Implement Patch Management Software
Deploying patches is time-consuming, tedious, and uses up a lot of resources. No wonder many IT employees see it as drudge work. The good news is there’s a smarter way to do it: by implementing patch management software. Key takeaways:…
Understanding DNS MX Records and Their Role in Email Security
DNS MX records are a key element in delivering an email successfully to its rightful recipient. But have you ever wondered what it takes to deliver an email? When sending an email, a lot happens within fractions of seconds to…
RCE Flaw Exposes 22,000 CyberPanel Instances to PSAUX Ransomware
Hackers exploited an RCE flaw to target over 22,000 CyberPanel servers with PSAUX ransomware. Nearly all CyberPanel instances went offline as a result. Researchers said that in fact there are three vulnerabilities in CyberPanel versions 2.3.6 and 2.3.7 that allowed…
New Qilin Ransomware Variant Spotted by Cybersecurity Researchers
A new version of the Qilin ransomware was discovered by cybersecurity researchers. The new version comes with increased sophistication and tactics to evade detection. The new variant is being tracked as Qilin.B by researchers at Halcyon and it notably supports…
UnitedHealth: 100 Million Individuals Affected by the Change Healthcare Data Breach
UnitedHealth confirms for the first time that over 100 million people had their personal information and healthcare records stolen during the Change Healthcare ransomware attack. Change Healthcare initially published a data breach notification warning in June, stating that a ransomware…
Why Is Privileged Access Management (PAM) Important?
Is your organization planning to implement a privileged access management (PAM) solution? If you already have passwords, an anti-virus, and a firewall, you might be wondering why you need to implement another cybersecurity technology. This article will help you understand…