Microsoft revealed that hackers have exploited as zero-day a Windows MSHTML platform spoofing vulnerability for more than two months. The company released a patch for CVE-2024-43461, during the September Patch Tuesday. They didn’t know that hackers were exploiting this flaw…
Tag: Heimdal Security Blog
How to Scale Your MSP from a Firm That Grew Revenue 440%
So, you’re running a reasonably successful MSP. You’re busy and have regular clients. Your profits, while not stellar, are good enough. You’ve got a decent reputation, not too much employee churn, and things are basically working fine. Let’s not minimize…
How MSPs Can Use the ‘Four Kinds of Luck’ to Succeed
When was the last time your business struck lucky? Perhaps a big new client contacted you out of the blue. Maybe you got talking to a stranger in a restaurant – and it turned out they needed support with IT.…
MSSPs – Why You Need a SOC Product And How to Choose the Right One
The last few years have seen a profound shift in the IT managed services market. Today, there is increasing customer demand for managed services providers (MSPs) and managed security services providers (MSSPs) to demonstrate their security and compliance credentials. To…
Microsoft Defender Endpoint Security vs. SentinelOne Singularity : Which One Should You Choose?
Are you considering investing in Microsoft Defender Endpoint Security or SentinelOne Singularity, but you are not sure which one? Choosing a cybersecurity solution is an important task that can even affect your overall business performance. Don’t worry! Knowing how important…
CrowdStrike Falcon vs. ESET Endpoint Security : Which One Should You Choose?
Are you considering investing in CrowdStrike Falcon or ESET Endpoint Security, but you are not sure which one? Choosing a cybersecurity solution is an important task that can even affect your overall business performance. Don’t worry! Knowing how important is…
CrowdStrike Falcon vs. Palo Alto Networks Cortex XDR : Which One Should You Choose?
Are you considering investing in CrowdStrike Falcon or Microsoft Defender Endpoint, but you are not sure which one? Choosing a cybersecurity solution is an important task that can even affect your overall business performance. Don’t worry! Knowing how important is…
CrowdStrike Falcon vs. IBM Security QRadar XDR : Which One Should You Choose?
Are you considering investing in CrowdStrike Falcon or Microsoft Defender Endpoint, but you are not sure which one? Choosing a cybersecurity solution is an important task that can even affect your overall business performance. Don’t worry! Knowing how important is…
CrowdStrike Falcon vs. Microsoft Defender Endpoint Security : Which One Should You Choose?
Are you considering investing in CrowdStrike Falcon or Microsoft Defender Endpoint, but you are not sure which one? Choosing a cybersecurity solution is an important task that can even affect your overall business performance. Don’t worry! Knowing how important is…
Cyberattack shuts down 34 Highline Public Schools for 3 days
A cyberattack on Highline Public Schools in Washington blocked educational activities for three days. 17,500 students in 34 schools from Washington State, as well as 2000 staff members, remained at home on September 9th. Because of this cyberattack, Highline Public…
Slim CD Data Breach Exposes Financial Data of almost 1.7 million People
Payment gateway provider Slim CD data breach compromised the credit card data of 1,693,000 US and Canadian users. The breach remained undetected for almost a year. Hackers breached Slim CD’s system in August 2023, but the company only detected suspicious…
Open XDR vs. Native XDR: A Selection Guide for Organizations
Open XDR vs native XDR is a recurring question in cybersecurity. Your guide through the decision process should be the company’s specific needs. Lack of information often makes choosing an XDR solution a slow process. Neglecting XDR because of indecisiveness…
Microchip Technology Confirms Data Was Stolen in August Cyberattack
American chip producer Microchip confirms that employee data was stolen during the cyberattack they suffered in August. The incident happened on August 17, and Microchip disclosed it on August 20, declaring that some of their manufacturing facilities had been affected.…
Russian Threat Actors Target Critical Infrastructure in the U.S. and Across the World
The Russian threat actors responsible for the worldwide attacks on key infrastructure, identified as Cadet Blizzard and Ember Bear, have been connected by the United States and its allies to Unit 29155 of the Main Directorate of the General Staff…
28 Zyxel Access Points and Router Vulnerable to OS Command Injection
Zyxel released updates to fix a critical vulnerability that impacts 28 access points (AP) and security router version. The Zyxel vulnerability is tracked as CVE-2024-7261 and has a 9.8 CVSS score, which is considered critical. The flaw enables hackers to…
Effective Privileged Access Management Implementation: A Step-by-Step Guide
Privileged access management (PAM) is a key part of modern cybersecurity. In simple terms, it’s the strategy you use to monitor and control access to the most sensitive assets or data – like confidential customer information or mission-critical servers. The…
Transport for London (TfL) Targeted in Cyberattack
Transport for London (TfL) announced on September 2nd that they have detected an ongoing cybersecurity incident. The attack did not disrupt services. For the moment, there is no evidence of the attackers succeeding to compromise customers data. TfL’s security team…
RansomHub Breached Over 200 Victims, the FBI Says
RansomHub ransomware affiliates have reportedly breached over 200 victims from a wide range of critical U.S. infrastructure sectors. This ransomware-as-a-service (RaaS) operation reached this milestone quickly, being first spotted in February 2024. The ransomware group specializes in data-theft-based extortion rather…
What Is XDR Threat Hunting?
Extended detection and response (XDR) products have become an increasingly common feature of the cybersecurity market in recent years. Today, they’re by far the most advanced option on the market for identifying and responding to emerging threats and sophisticated attacks.…
Top Cybersecurity Companies You Need to Know in 2024 (And How to Choose One)
Top cybersecurity companies play a pivotal role in addressing the financial impact of cybercrime, as evidenced by Cybersecurity Ventures’ forecast that in 2024, global cybercrime damage costs will reach $9.5 trillion USD annually, $793 billion USD monthly, and $182.5 billion…