Did you know? — Recent research shows that 80% of cyberattacks happen due to unpatched software vulnerabilities. This highlights the critical role of automated patch management software in safeguarding systems. These tools not only streamline updates but also fortify your…
Tag: Heimdal Security Blog
HealthEquity Hit by Data Breach: Protected Information Exposed
HealthEquity, a healthcare fintech company, is warning that it suffered a data breach after a partner’s account was compromised and used to access the company’s systems. Protected health information was stolen during the attack. Details About the Incident The company…
RegreSSHion Vulnerability Exposes Linux Systems to RCE Attacks
Researchers revealed a signal handler race condition RegreSSHion vulnerability that puts OpenSSH servers at risk. The flaw is tracked as CVE-2024-6387 and got a high severity CVSS – 8.1. Hackers can exploit it to obtain unauthenticated remote code execution (RCE)…
How Patch Management Software Solves the Update Problem
I’ve never met an IT leader who doesn’t know how important patch management is. Keeping your software up to date means it’s far harder for hackers to break into your systems and wreak havoc. So it’s surprising that this knowledge…
Cross-Platform Product Release: Heimdal Integrates with HaloPSA
We are excited to announce a special release, substantiating our key cross-platform product direction. New features and improvements are rolling out for Linux Ubuntu, macOS, and Windows. The updates are available in the Release Candidate and Production versions of the…
New MOVEit Transfer Critical Vulnerability Targeted by Threat Actors
A new critical authentication bypass flaw in Progress MOVEit Transfer was disclosed, and threat actors are already trying their best to exploit it. The new security flaw, which goes by the number CVE-2024-5806, enables attackers to get around the Secure…
Heimdal and Escom Bulgaria Partner to Strengthen Cybersecurity in Bulgaria
Heimdal has agreed to a long-term partnership with Escom Bulgaria to distribute our products in Bulgaria, so we sat down with Mr. Alexander Zhekov, Escom Bulgaria’s Managing Director. He’s a seasoned professional with over 10 years of security experience. Escom…
LockBit Claims Breaching the US Federal Reserve but Fails to Prove It
On June 23rd, LockBit announced breaching the US Federal Reserve System, while security experts remained skeptical. The Russian threat group claimed to exfiltrate 33 terabytes of banking information from the USA’s central bank servers. They also threatened to publish the…
LockBit Claims Breaching the US Federal Reserve but Fails Proving It
On June 23rd, LockBit announced breaching the US Federal Reserve System, while security experts remained skeptical. The Russian threat group claimed to exfiltrate 33 terabytes of banking information from the USA’s central bank servers. They also threatened to publish the…
Top 10 NinjaOne Alternatives to Consider in 2024
Choosing an IT management software is one of the most important decisions you make as an IT team. There are a few well-known platforms on the market, one being NinjaOne. Considering the feedback from review sites, NinjaOne customers are switching…
GrimResource Technique Exploits Years-Old Unpatched Windows XSS Flaw
New GrimResource technique exploits a 2018-old, unpatched, Windows XSS flaw and crafted MSC files to deploy malware via the Microsoft Management Console (MMC). Researchers detected the new exploitation technique in the wild on June 6th, 2024. Exploiting the Microsoft Management…
Sophos vs. Trend Micro: How Do They Shape Up?
If you’re in the market for an endpoint detection and response (XDR) product, there are plenty of options available. But within the word salad of overlapping terms (XDR, EDR, ASM, and more), it can be a real challenge to actually…
ONNX Phishing Targets Financial Companies’ Microsoft 365 Accounts
ONNX Store new PhaaS is targeting Microsoft 365 and Office 365 accounts in financial companies. The hackers use QR codes in PDF attachments to lure the employees into clicking malicious links. The phishing platform uses Telegram bots to spread and…
What Is a Bastion Host? Types, Use Cases, and Safety Measures
A bastion host is a server placed between the public internet and a company’s private network. It enhances security by allowing access only to specific, authorized users. If you know about jump servers, you’ll recognize this concept. If not, you…
Crypter Specialist Involved in the Conti and LockBit Attack Arrested
A 28-year-old Russian man has been taken into custody by the Ukraine cyber police in Kyiv for his involvement in the Conti and LockBit ransomware operations, which involved making their malware impervious to antivirus software and carrying out at least…
The Top 7 Unified Endpoint Management Tools in 2024
In the last decade, cybersecurity has come a long way. Once upon a time, keeping your IT environment secure largely required passwords, firewalls, and antivirus. In the days since, the move to cloud technology has thrown up a whole range…
Cleveland Cyberattack Turns Public Services Offline for Days
Cleveland cyberattack shut down the City Hall and the Erieview offices for the last two days. Authorities revealed the incident on Monday June 10th and said public services were put offline until further notice. Emergency services and public utilities, like…
MSMQ Vulnerability Allows Hackers to Takeover Microsoft Servers
On June 11th, Microsoft announced fixing a critical RCE vulnerability in their Message Queuing (MSMQ) technology. The flaw is tracked CVE-2024-30080 and has a CVSS score of 9.8 out of 10. Security researchers say threat hackers can exploit it remotely…
2024’s Best RMM Solutions for MSPs: Top 10 Remote IT Management Tools
In this article, we’ll answer your question: “What are the best RMM solutions for 2024?” We’ll explore the top 10 tools to help MSPs efficiently monitor and manage client systems. Here’s a quick glance for you: Heimdal XDR ConnectWise Automate…
Less Is More: Why MSPs Are Moving to the Cybersecurity Platform Model
A growing number of MSPs are moving towards a platform approach for their cybersecurity tools. What’s behind the shift away from point solutions? Imagine you’re packing your bag to go camping. You might need to cut some twigs for kindling,…