Tag: Heimdal Security Blog

WannaCry Ransomware Explained

Read the original article: WannaCry Ransomware Explained Ransomware has become one of the main cyber threats that can have devastating effects on organizations, resulting in financial damage, corporate instability, and reputational harm. This type of malware uses complex encryption algorithms…

Danish Reseller Attacked by Russian Hackers

Read the original article: Danish Reseller Attacked by Russian Hackers Russian hackers attack unknowing victims! Heimdal™ Security, a Copenhagen-based online security provider, has recently flushed out a hacking group nested around Moscow. The threat group, which has yet to be…

Essential Cybersecurity Considerations for Governmental Organizations

Read the original article: Essential Cybersecurity Considerations for Governmental Organizations Hackers have been increasingly targeting governmental institutions in recent years. The Center for Strategic and International Studies has been recording significant incidents since 2006, and let me tell you, the…

Essential Cybersecurity Considerations for Governmental Organizations

Read the original article: Essential Cybersecurity Considerations for Governmental Organizations Hackers have been increasingly targeting governmental institutions in recent years. The Center for Strategic and International Studies has been recording significant incidents since 2006, and let me tell you, the…

Heimdal™ Security Employee Spotlight: Adelin Ghenea

Read the original article: Heimdal™ Security Employee Spotlight: Adelin Ghenea From an initially shy interviewee to one of the most valuable members of the Heimdal™ development team, Adelin Ghenea has had a great journey with us, one which will hopefully…

Smurf Attack 101: History, M.O., Consequences

Read the original article: Smurf Attack 101: History, M.O., Consequences The Smurf Attack is one of the oldest, simplest and effective cyber-attacks, one that can draw down many unpleasant consequences for any targeted company. Before trying to understand what is…

Virus vs. Worm: What’s the Difference?

Read the original article: Virus vs. Worm: What’s the Difference? Virus vs. worm – is there any difference? Short answer: yes, definitely, and you should never confuse one with the other. In this article, I’m going to introduce you to…

Is Coinbase Safe? A Modern Financial Lesson

Read the original article: Is Coinbase Safe? A Modern Financial Lesson What privacy and security concerns should Coinbase users have? Is Coinbase safe to use? What should you keep in mind before you dive? In this guide, I will walk…

5 Essential Features to Look for in a PAM Solution

Read the original article: 5 Essential Features to Look for in a PAM Solution You probably already know it by now – the ultimate purpose of cybercriminals is to gain access to your organization’s sensitive data and systems, and your…

Patch Tuesday (September 2020): Microsoft Addresses 129 Vulnerabilities

Read the original article: Patch Tuesday (September 2020): Microsoft Addresses 129 Vulnerabilities Microsoft’s September 2020 Patch Tuesday brings along its traditional monthly updates, enabling network administrators to address the latest discovered security issues associated with the vendor’s products. Malicious hackers…

Heimdal™ Security Employee Spotlight: Caroline Stenstrup

Read the original article: Heimdal™ Security Employee Spotlight: Caroline Stenstrup When we first spotted Caroline Stenstrup’s potential talent, she was part of the waiting team at one of our favorite restaurants in Copenhagen. After talking with her for a bit,…

Epiq Ransomware – A Team Effort

Read the original article: Epiq Ransomware – A Team Effort What do you get when you combine three virulent cyber attacks? An epiq ransomware case.  As we have defined it in our Cybersecurity Glossary, ransomware is a type of malware…

PAM Security Essentials – Identity Management & Asset Protection

Read the original article: PAM Security Essentials – Identity Management & Asset Protection Privileged Access Management (P.A.M) has gained quite a lot of traction. A cliché indeed, but nonetheless true. Unsupervised accounts, unnecessarily elevated rights, subpar SAML implementation, and the…

Patch Management Policy: A Practical Guide

Read the original article: Patch Management Policy: A Practical Guide Patching – this highly necessary, yet sometimes neglected practice of resolving security issues related to vulnerabilities – can be a burden for organizations of all sizes. You probably already know…

What is Maze Ransomware?

Read the original article: What is Maze Ransomware? Coming back to your laptop only to find all your data encrypted and a defiant message on your screen asking you for money in return might probably be one of the scariest…

What is (an) Intrusion Prevention System?

Read the original article: What is (an) Intrusion Prevention System? Intrusion Prevention System may very well be the next milestone in proactive network security. The reasoning behind the statement is not hard to grasp – a June 2020 study, focused…

What is Vulnerability Management?

Read the original article: What is Vulnerability Management? Some people still believe their IT infrastructure is unflawed simply because they’ve never experienced a cybersecurity incident – until something goes wrong and the company becomes the victim of a malware attack…

Web Application Security – A Complete Guide

Read the original article: Web Application Security – A Complete Guide OCD or just very fond of structure, I must confess that I like pretty much everything around me to be in (a specific) order. Due to this habit, I…

Cloud Computing Threats: Beyond Vulnerabilities

Read the original article: Cloud Computing Threats: Beyond Vulnerabilities When you hear the term cloud computing, know that it has little to do with the famous cloud number 9 some sing about – it is a key concept in the…

What is Privileged Access Management (PAM)?

Read the original article: What is Privileged Access Management (PAM)? Privileged Access Management ensures business safety through privileged accounts monitoring, preventing external and internal threats that result from the improper use of admin rights. It is based upon the Principle…

What is Privileged Access Management (PAM)?

Read the original article: What is Privileged Access Management (PAM)? Privileged Access Management ensures business safety through privileged accounts monitoring, preventing external and internal threats that result from the improper use of admin rights. It is based upon the Principle…

Best IoT Security Management for your Business

Read the original article: Best IoT Security Management for your Business We might feel that technology plays a big part in our lives, always with our eyes on our phones or turning on the TV immediately after we got home…

What is Patch Management?

Read the original article: What is Patch Management? You can’t control the emergence of cyber threats. But you can have complete control over your organization’s vulnerabilities and efficiently manage them. Bad patch management has been one of the reasons behind…

What Is EDR and Why Is It Important?

Read the original article: What Is EDR and Why Is It Important? Oftentimes, your organization’s endpoints can become key entry points for cyber attackers. With the evolution of workplace mobility and employees connecting to the Internet from their off-site endpoints…

What Is EDR and Why Is It Important?

Read the original article: What Is EDR and Why Is It Important? Oftentimes, your organization’s endpoints can become key entry points for cyber attackers. With the evolution of workplace mobility and employees connecting to the Internet from their off-site endpoints…