Tag: Heimdal Security Blog

Patch Management Guide

Patch management involves distributing and applying updates to various endpoints, which is crucial in fixing software vulnerabilities or unforeseen system interactions.  60% of cyber incidents leading to covert data theft link to absent, misconfigured, or incompletely implemented patches.  A concerning…

Vulnerability Prioritization: How to Beat Patching Paralysis

Key Takeaways: Vulnerability prioritization is about deciding what to patch, and in what order.  Many organizations use unsatisfactory methods when prioritizing patches. Learn how a holistic, risk-based approach to vulnerability prioritization can improve patch management.  Find out how automated vulnerability…

Researchers Warn NetSupport RAT Attacks Are on the Rise

Researchers warn of an increase in NetSupport RAT (Remote Access Trojan) infections impacting education, government, and business services sectors. NetSupport Manager is a remote control and desktop management tool by NetSupport Ltd. Its initial role was to aid IT professionals…

Assigning User Privileges in Heimdal [It’s Easy]

Managing user privileges is a critical task for any organization. This article aims to guide you through the process of assigning user privileges in Heimdal, ensuring a secure and efficient management of your cybersecurity infrastructure.  Key Takeaway Summary  Understanding User…

How to Implement an Effective Mac Patch Management Strategy

An effective Mac patch management strategy involves following a series of well-planned steps and best practices. Patch management strategies are not just about bug fixes, closing vulnerabilities, and improving system performance. Meeting compliance requirements is also on the goals list. …

Heimdal Launches Unique AI Feature to Detect Email Fraud

Heimdal has launched “Outliers Detection”, an AI-powered feature that upgrades its Email Fraud Protection platform. This tool uses AI to proactively spot and stop email threats early, keeping businesses safe. Our method is both innovative one-of-a-kind. We use anomaly detection…

Truepill Sued Over Data Breach Exposing 2.3 Million Customers

Truepill data breach exposed sensitive information belonging to 2,364,359 people and risks multiple lawsuits. The B2B-focused pharmacy platform discovered the incident on August 31, 2023. They promptly launched an investigation and took additional security measures to contain the incident. However,…

Samsung UK Online Store Suffers Data Breach

Samsung Electronics has informed its customers about a data breach impacting those who shopped at the Samsung UK online store from July 1, 2019, to June 30, 2020. This breach resulted in unauthorized access to personal information. Breach Traced to…

FBI and CISA Issue Advisory on Rhysida Ransomware

Today, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have jointly issued a warning about the Rhysida ransomware group. This gang has been attacking various organizations in different sectors since May 2023. A detailed Cybersecurity Advisory (CSA) has…

The Most Common Healthcare Cyberattacks

In the wrong hands, medical data can be used for a variety of crimes, such as patient identity theft, clinician identity theft, extortion, tax fraud, insurance fraud, and more. Geopolitical agendas further complicate the threat landscape, as cyberattacks such as…