Researchers warn that NotLockBit, a new malware family mimicking LockBit ransomware, can impact Windows and macOS systems. The malware appears to be the first fully functional ransomware targeting macOS systems, moving beyond previous proof-of-concept (PoC) samples. What is NotLockBit Ransomware…
Tag: Heimdal Security Blog
CISA Proposes Stronger Security Requirements to Protect Sensitive Data
CISA pushes for stronger security requirements to safeguard sensitive personal and government-related data from foreign adversaries. The need to implement Executive Order 14117, signed by President Biden in February 2024, is what triggered the Cybersecurity and Infrastructure Security Agency’s (CISA)…
Microsoft Reveals Loss of Customer Security Logs for a Month
Microsoft is alerting business clients to a flaw that resulted in critical logs being partially lost for nearly a month. This puts at risk businesses who depend on this data to identify unwanted activity. Microsoft is alerting enterprise customers that…
Free & Downloadable User Access Review Policy Template – 2024
Managing access to sensitive systems and data is more crucial than ever. Organizations across all industries face significant challenges in ensuring that their security measures keep pace with the complexities of user access management. To address these challenges, we’ve developed…
Free & Downloadable User Access Review Policy Template – 2024
Managing access to sensitive systems and data is more crucial than ever. Organizations across all industries face significant challenges in ensuring that their security measures keep pace with the complexities of user access management. To address these challenges, we’ve developed…
What Are Managed Security Services: Benefits and Solutions
Managed Security Services (MSS) refers to outsourcing security functions to a specialized provider. All MSS main types aim to offer top technology and expertise at a convenient price. Not all of them are a good match to your company. Let’s…
CISA: Threat Actors Exploit F5 BIG-IP Cookies for Network Reconnaissance
The F5 BIG-IP Local Traffic Manager (LTM) module is used by threat actors to manage unencrypted persistent cookies, which the U.S. Cybersecurity and Infrastructure Security Agency (CISA) is alerting users to as a means of network surveillance. The advisory stated…
7 Privileged Access Management (PAM) deployment mistakes to avoid
Privileged Access Management (PAM) deployment isn’t always successful. And on Reddit, SysAdmins aren’t holding back: It’s overkill and I hate it PAM is expensive and difficult to implement I can say that it is hot garbage with every ounce of…
Job Scams Report – 2,670 Social Media Posts Reveal Scammers’ Top Tactics
Although job platforms and social networking sites work hard to combat fake listings, scammers consistently find new ways to bypass security measures. These fraudulent listings often go public, putting job seekers at serious risk. We reviewed 2,670 posts and comments…
Top 10 Managed Service Providers in New Jersey for 2024
New Jersey, often seen as the corridor between New York and Philadelphia, is not only a strategic location for businesses but also a hub for technology services, including top Managed Service Providers. Managed Service Providers play a crucial role in…
Top 10 SentinelOne Competitors & Alternatives in 2024 [Features, Pricing & Reviews]
SentinelOne shines in endpoint detection and response, but EDR is just one piece of the in-depth defense puzzle. Choosing the right cybersecurity solution is key to safeguarding your systems. To fully protect your network, cloud, or email, you’ll need more…
New CUPS Vulnerability Can Amplify DDoS Attacks: Patch Now!
A newly discovered vulnerability in the open-source CUPS (Common Unix Printing System) printing system can be used by threat actors to launch DDoS attacks with a 600x amplification factor. Known as CVE-2024-47176, the security flaw in the cups-browsed daemon can…
The Complete Guide to PAM Tools, Features, And Techniques
Privileged access management is one of the most important topics in cybersecurity – yet it can be a minefield to get right. For hackers, elevated permissions are one of the absolute best ways to plan and execute a successful account.…
Admin Rights in Action: How Hackers Target Privileged Accounts
Admin rights are one of the most important and fundamental aspects of cybersecurity. Without elevated permissions, hackers will have a hard time stealing your data or disrupting your services. For that reason, they’re often trying to gain access to an…
Ransomware Attack Disrupts UMC Health System Activity
UMC Health System was hit by a ransomware attack at the end of September. The attack caused the healthcare institution to divert patients to other clinics. Initially, the healthcare provider was unable to process messages from the patient portal. Also,…
Test before patching. Windows update KB5043145 turns computers unstable
System Administrators warn that an optional Windows 11 update released on September 23rd creates issues for some computers. The cumulative update preview for Windows 11 Version 23H2 for x64-based systems brought new features for the Start menu, taskbar, and lock…
Why Is IT Forcing You to Patch Your Software? Understand the Importance of Patching
Most people today have at least some experience with patching. If you own a smartphone, you will be familiar with Android or iOS updates. Same goes with the apps on your phone. Whether you use banking, travel or social media…
Zen and the Art of Modern Patch Management: How to Eliminate Stress, Improve Security, and Streamline IT Operations
Patch management is stressful. In one of our Heimdal webinars, we ran a snap poll with sysadmins about how they find the patch management process. The results confirm what most of us already know: the vast majority (93%) have experienced…
EDR vs. SIEM: Key Differences, Features, Functionality Gaps, and More
When it comes to threat detection, it’s important to get the right tools for the job. Unfortunately, that can be easier said than done. Whether it’s a SIEM, EDR, XDR, MDR, or any of a whole other range of confusing…
Heimdal and emt Distribution Aim to Dominate the Middle East Cybersecurity Market
COPENHAGEN, Denmark, and Dubai, UAE, September 30, 2024 – Heimdal and emt Distribution announce a strategic partnership that combines Heimdal’s advanced cybersecurity solutions with emt Distribution’s deep market expertise. The collaboration will deliver sophisticated yet user friendly products to the…