Read the original article: The Picture of a Modern-day Highwayman – RobbinHood Ransomware Riddle me this: what bears the name of a famous English, tights-wearing rogue but keeps the spoils instead of handing them out to the downtrodden? No, it’s…
Tag: Heimdal Security Blog
Complete Our Survey and Redeem an Extended 60-Day Trial of Thor Foresight Enterprise [EXTENDED]
Read the original article: Complete Our Survey and Redeem an Extended 60-Day Trial of Thor Foresight Enterprise [EXTENDED] Are you a Heimdal Security blog reader and/or customer? Then you already know how passionate we are about cybersecurity research and education. This…
SaaS Security: How to Protect Your Enterprise in the Cloud
Read the original article: SaaS Security: How to Protect Your Enterprise in the Cloud Take a moment to think about the software your company uses daily. I’d be willing to bet on the fact that it is deployed as a…
SECURITY ALERT: Heimdal™ Puts out an APB on Russian Hackers Responsible for Danish Reseller Attack
Read the original article: SECURITY ALERT: Heimdal™ Puts out an APB on Russian Hackers Responsible for Danish Reseller Attack Following Heimdal’s discovery of the Russian hacking attack on Harbor IT, the Danish cybersecurity vendor urges everyone, companies, and home users…
SECURITY ALERT: Donald Trump Campaign Website Temporarily Disrupted by Vigilante Hacking Group
Read the original article: SECURITY ALERT: Donald Trump Campaign Website Temporarily Disrupted by Vigilante Hacking Group On Tuesday night, White House officials confirmed that Donald Trump’s campaigned site become temporarily unavailable due to hacking. The POTUS’s website was replaced by…
Is Telegram Secure? What You Need to Know Before Downloading the App
Read the original article: Is Telegram Secure? What You Need to Know Before Downloading the App When compared to renowned instant messaging apps such as WhatsApp or Facebook Messenger, Telegram might seem like the underdog. However, the Russian platform is…
Donald Trump Campaign Website Temporarily Disrupted by Vigilante Hacking Group
Read the original article: Donald Trump Campaign Website Temporarily Disrupted by Vigilante Hacking Group On Tuesday night, White House officials confirmed that Donald Trump’s campaigned site become temporarily unavailable due to hacking. The POTUS’s website was replaced by a fake…
Is Telegram Secure? What You Need to Know Before Downloading the App
Read the original article: Is Telegram Secure? What You Need to Know Before Downloading the App When compared to renowned instant messaging apps such as WhatsApp or Facebook Messenger, Telegram might seem like the underdog. However, the Russian platform is…
WannaCry Ransomware Explained
Read the original article: WannaCry Ransomware Explained Ransomware has become one of the main cyber threats that can have devastating effects on organizations, resulting in financial damage, corporate instability, and reputational harm. This type of malware uses complex encryption algorithms…
Heimdal™ Security Is a Finalist for Computing Security Awards 2020 in Eight Categories!
Read the original article: Heimdal™ Security Is a Finalist for Computing Security Awards 2020 in Eight Categories! Thanks to you and your continuous support, our cybersecurity solutions were nominated and chosen as finalists for the Computing Security Awards 2020 edition!…
Rik Schoonis Is Joining Heimdal™ Security’s Executive All-Star Team as Country Manager for Netherlands
Read the original article: Rik Schoonis Is Joining Heimdal™ Security’s Executive All-Star Team as Country Manager for Netherlands Copenhagen – October 23rd, 2020 – Heimdal™ Security (HEIMDAL) today announced its executive team has expanded even further to include a new…
Danish Reseller Attacked by Russian Hackers
Read the original article: Danish Reseller Attacked by Russian Hackers Russian hackers attack unknowing victims! Heimdal™ Security, a Copenhagen-based online security provider, has recently flushed out a hacking group nested around Moscow. The threat group, which has yet to be…
Software Rot and Cybersecurity: Why Code Degradation Is Crucial to Business Safety
Read the original article: Software Rot and Cybersecurity: Why Code Degradation Is Crucial to Business Safety Nature, people, states, machines, relationships – everything has a life cycle. Including technology. Nothing stays in the same perfect condition forever and nothing works…
Complete Our Survey and Redeem an Extended 60-Day Trial of Thor Foresight Enterprise
Read the original article: Complete Our Survey and Redeem an Extended 60-Day Trial of Thor Foresight Enterprise Are you a Heimdal Security blog reader and/or customer? Then you already know how passionate we are about cybersecurity research and education. This is…
Essential Cybersecurity Considerations for Governmental Organizations
Read the original article: Essential Cybersecurity Considerations for Governmental Organizations Hackers have been increasingly targeting governmental institutions in recent years. The Center for Strategic and International Studies has been recording significant incidents since 2006, and let me tell you, the…
RMM Software: All You Need to Know About Remote Monitoring Management Software
Read the original article: RMM Software: All You Need to Know About Remote Monitoring Management Software RMM software (short for Remote Monitoring and Management Software) refers to the platforms used by IT professionals and organizations to remotely manage and monitor…
RMM Software: All You Need to Know About Remote Monitoring Management Software
Read the original article: RMM Software: All You Need to Know About Remote Monitoring Management Software RMM software (short for Remote Monitoring and Management Software) refers to the platforms used by IT professionals and organizations to remotely manage and monitor…
Essential Cybersecurity Considerations for Governmental Organizations
Read the original article: Essential Cybersecurity Considerations for Governmental Organizations Hackers have been increasingly targeting governmental institutions in recent years. The Center for Strategic and International Studies has been recording significant incidents since 2006, and let me tell you, the…
Heimdal™ Security Employee Spotlight: Adelin Ghenea
Read the original article: Heimdal™ Security Employee Spotlight: Adelin Ghenea From an initially shy interviewee to one of the most valuable members of the Heimdal™ development team, Adelin Ghenea has had a great journey with us, one which will hopefully…
Android Permissions Can Be Dangerous: Full Guide to Managing Them
Read the original article: Android Permissions Can Be Dangerous: Full Guide to Managing Them Alexander Graham Bell’s invention of the telephone back in 1876 marked one of the most important cultural revolutions of mankind – its invention and everything that…
Patch Tuesday (October 2020): Microsoft Fixes Wormable Remote Code Execution Vulnerability
Read the original article: Patch Tuesday (October 2020): Microsoft Fixes Wormable Remote Code Execution Vulnerability Microsoft’s security updates (the October 2020 Patch Tuesday) have been released. Patches have been rolled out for 87 security bugs. 11 out of the vulnerabilities…
Email Security 101: Protecting Your Business Against Email Threats
Read the original article: Email Security 101: Protecting Your Business Against Email Threats Should you be concerned about email security? What are some of the biggest email threats? How do you defend your organization against them? These questions may have…
Smurf Attack 101: History, M.O., Consequences
Read the original article: Smurf Attack 101: History, M.O., Consequences The Smurf Attack is one of the oldest, simplest and effective cyber-attacks, one that can draw down many unpleasant consequences for any targeted company. Before trying to understand what is…
Making the Case for Cybersecurity in Non-Profit and Non-Governmental Organizations
Read the original article: Making the Case for Cybersecurity in Non-Profit and Non-Governmental Organizations Nobody is safe on the Internet nowadays, as hackers don’t discriminate when choosing their victims. A clear example of that is their relentlessness in targeting enterprises…
Heimdal™ Security’s Lost & Found Bin – The Macro Virus
Read the original article: Heimdal™ Security’s Lost & Found Bin – The Macro Virus The macro virus was downright tony in the late ’90s and has certainly done its best to secure a great spot in the malware hall of…
Kolz Ransomware 101: The STOP Djvu Variant to Watch Out for
Read the original article: Kolz Ransomware 101: The STOP Djvu Variant to Watch Out for A new cyber-threat is making waves online, as more and more users are starting to report infections. I’m talking about Kolz ransomware, a relatively unknown…
Sodinokibi Ransomware 101: Origin, Victims, Prevention Strategies
Read the original article: Sodinokibi Ransomware 101: Origin, Victims, Prevention Strategies Cyberattacks have become a part of our reality, but have you ever wondered what might happen if your company gets targeted? You probably imagine that you would lose some…
Virus vs. Worm: What’s the Difference?
Read the original article: Virus vs. Worm: What’s the Difference? Virus vs. worm – is there any difference? Short answer: yes, definitely, and you should never confuse one with the other. In this article, I’m going to introduce you to…
Network Firewall Security Essentials for Businesses: What You Need to Know
Read the original article: Network Firewall Security Essentials for Businesses: What You Need to Know What is network firewall security? An essential component of a successful cybersecurity strategy, it relies on the firewall, a known companion of any device that…
Schools Are Moving to Remote Lessons: Cybersecurity Essentials for Schools [Updated]
Read the original article: Schools Are Moving to Remote Lessons: Cybersecurity Essentials for Schools [Updated] With the start of this new school year, students are returning to classrooms for the first time in months. However, it is more than clear…
Is Coinbase Safe? A Modern Financial Lesson
Read the original article: Is Coinbase Safe? A Modern Financial Lesson What privacy and security concerns should Coinbase users have? Is Coinbase safe to use? What should you keep in mind before you dive? In this guide, I will walk…
Cloud Migration 101: Strategy, Precautions, Risks, and Security
Read the original article: Cloud Migration 101: Strategy, Precautions, Risks, and Security Ever since cloud computing became something more than an academic icebreaker, companies have sought to reap its benefits. One of the many innovations of cloud computing is cloud…
How to Protect Your Enterprise from Ako Ransomware: Essentials to Keep in Mind
Read the original article: How to Protect Your Enterprise from Ako Ransomware: Essentials to Keep in Mind You might be tempted to think that you’ve seen it all before as far as cyberattacks are concerned. Enter Ako ransomware, a strain…
5 Essential Features to Look for in a PAM Solution
Read the original article: 5 Essential Features to Look for in a PAM Solution You probably already know it by now – the ultimate purpose of cybercriminals is to gain access to your organization’s sensitive data and systems, and your…
Network Cybersecurity 101: Protecting Your Company’s Online Perimeter
Read the original article: Network Cybersecurity 101: Protecting Your Company’s Online Perimeter Cyber security, network security, online perimeter security – you’ve probably heard one or all of these terms thrown around in various conversations on digital defense practices. But what…
5 Lessons to Learn in Vulnerability Risk Assessment
Read the original article: 5 Lessons to Learn in Vulnerability Risk Assessment They say that a business can be anything: a boat, a wave, a force of nature, a happy mistake. As far as I’m concerned, running a business is…
Netwalker Ransomware Explained: What You Need to Know [Updated]
Read the original article: Netwalker Ransomware Explained: What You Need to Know [Updated] Even though ransomware has been around since 1996, it is as present of a threat today as it was two decades ago. The most chilling part is…
Patch Tuesday (September 2020): Microsoft Addresses 129 Vulnerabilities
Read the original article: Patch Tuesday (September 2020): Microsoft Addresses 129 Vulnerabilities Microsoft’s September 2020 Patch Tuesday brings along its traditional monthly updates, enabling network administrators to address the latest discovered security issues associated with the vendor’s products. Malicious hackers…
Heimdal™ Security Employee Spotlight: Caroline Stenstrup
Read the original article: Heimdal™ Security Employee Spotlight: Caroline Stenstrup When we first spotted Caroline Stenstrup’s potential talent, she was part of the waiting team at one of our favorite restaurants in Copenhagen. After talking with her for a bit,…
5 Patch Management Best Practices to Safeguard Your Business in 2020
Read the original article: 5 Patch Management Best Practices to Safeguard Your Business in 2020 Although patch management is not a novel activity, many organizations are still having a hard time following the industry’s best practices. Since patching is one…
The Curious Case of the Baltimore Ransomware Attack: What You Need to Know
Read the original article: The Curious Case of the Baltimore Ransomware Attack: What You Need to Know Nowadays, cybercriminals are becoming increasingly hooked on big game hunting. Public institutions ranging from educational facilities to governmental agencies seem to be their…
Epiq Ransomware – A Team Effort
Read the original article: Epiq Ransomware – A Team Effort What do you get when you combine three virulent cyber attacks? An epiq ransomware case. As we have defined it in our Cybersecurity Glossary, ransomware is a type of malware…
Ruth Schofield Is Joining Heimdal™ Security’s Executive All-Star Team as UK Sales Director
Read the original article: Ruth Schofield Is Joining Heimdal™ Security’s Executive All-Star Team as UK Sales Director Copenhagen – September 4th 2020 – Heimdal™ Security (HEIMDAL) today announced its executive team has landed a new cybersecurity superstar, Ruth Schofield. In…
Ivana Marisol Silva Is Joining Heimdal™ Security’s Executive All-Star Team as Norway Country Manager
Read the original article: Ivana Marisol Silva Is Joining Heimdal™ Security’s Executive All-Star Team as Norway Country Manager Copenhagen – September 4th, 2020 – Heimdal™ Security (HEIMDAL) today announced its executive team is thrilled to include Ivana Marisol Silva as…
Christian H. von Hoesslin Is Joining Heimdal™ Security’s Executive All-Star Team as Country Manager DACH
Read the original article: Christian H. von Hoesslin Is Joining Heimdal™ Security’s Executive All-Star Team as Country Manager DACH Copenhagen – September 4th 2020 – Heimdal™ Security (HEIMDAL) today announced its executive team has landed a new cybersecurity superstar, Christian…
Heimdal™ Security in 2021: Outlying the Continued Growth Strategy and Market Predictions
Read the original article: Heimdal™ Security in 2021: Outlying the Continued Growth Strategy and Market Predictions Copenhagen – September 4th, 2020 – Heimdal™ Security (HEIMDAL™) announced today its vision for the company’s strategy for 2021, some major developments they are…
Ralph Renna Is Joining Heimdal™ Security’s Executive All-Star Team as USA Sales Director
Read the original article: Ralph Renna Is Joining Heimdal™ Security’s Executive All-Star Team as USA Sales Director Copenhagen – September 4th, 2020 – Heimdal™ Security (HEIMDAL) today announced its executive team is thrilled to include Ralph Renna. To professionals across…
PAM Security Essentials – Identity Management & Asset Protection
Read the original article: PAM Security Essentials – Identity Management & Asset Protection Privileged Access Management (P.A.M) has gained quite a lot of traction. A cliché indeed, but nonetheless true. Unsupervised accounts, unnecessarily elevated rights, subpar SAML implementation, and the…
Schools Are Moving to Remote Lessons: Cybersecurity Essentials for Schools
Read the original article: Schools Are Moving to Remote Lessons: Cybersecurity Essentials for Schools With the start of this new school year, students are returning to classrooms for the first time in months. However, it is more than clear that…
What Is DNS Content Filtering and Why Does Your Business Need It?
Read the original article: What Is DNS Content Filtering and Why Does Your Business Need It? Before diving into what DNS content filtering is and why your business needs it, I think it wouldn’t be a bad idea if we…
Your Blood Work Results May Contain Too Much Sensitive Information
Read the original article: Your Blood Work Results May Contain Too Much Sensitive Information A few days ago, we found a scrap of paper outside our office in Copenhagen. It was highly visible from a distance that there were blood…
7 Open Source Patch Management Software to Bootstrap Your Business
Read the original article: 7 Open Source Patch Management Software to Bootstrap Your Business Ever since Microsoft said that outdated software is the preferred entry point for threat actors, patch management has finally gotten the attention it deserves; and for…
Bot Attacks Are Increasingly Targeting Businesses. How to Stay Safe
Read the original article: Bot Attacks Are Increasingly Targeting Businesses. How to Stay Safe Businesses are becoming increasingly aware of the cyber-threat represented by bot attacks. In fact, over 70% of organizations in the e-commerce, entertainment, travel, and financial services…
Privileged Account Management 101: How Can Privileged Accounts Compromise Your Security
Read the original article: Privileged Account Management 101: How Can Privileged Accounts Compromise Your Security When it comes to privileged account management (PAM), you might want to know: – what is a privileged account? – does it have any connection…
Patch Management Policy: A Practical Guide
Read the original article: Patch Management Policy: A Practical Guide Patching – this highly necessary, yet sometimes neglected practice of resolving security issues related to vulnerabilities – can be a burden for organizations of all sizes. You probably already know…
What is Maze Ransomware?
Read the original article: What is Maze Ransomware? Coming back to your laptop only to find all your data encrypted and a defiant message on your screen asking you for money in return might probably be one of the scariest…
Unified Endpoint Management Explained: (Why) Does Your Company Need One?
Read the original article: Unified Endpoint Management Explained: (Why) Does Your Company Need One? Gone are the days when a lone system administrator would perch upon the ledge of your desk to help you with menial tasks such as connecting…
Emotet Malware Over the Years: The History of an Active Cyber-Threat
Read the original article: Emotet Malware Over the Years: The History of an Active Cyber-Threat Malware strains come and go while Internet users become more and more accustomed to online threats being dealt with swiftly by the competent authorities. But…
What is (an) Intrusion Prevention System?
Read the original article: What is (an) Intrusion Prevention System? Intrusion Prevention System may very well be the next milestone in proactive network security. The reasoning behind the statement is not hard to grasp – a June 2020 study, focused…
What is Vulnerability Management?
Read the original article: What is Vulnerability Management? Some people still believe their IT infrastructure is unflawed simply because they’ve never experienced a cybersecurity incident – until something goes wrong and the company becomes the victim of a malware attack…
What Is Riskware? Cybersecurity Threats You Must Be Aware Of
Read the original article: What Is Riskware? Cybersecurity Threats You Must Be Aware Of Whether we use it mostly at home or at work, the Internet is not always a safe place – clearly. As cybersecurity professionals, we know –…
Patch Tuesday (August 2020): Microsoft patches 120 vulnerabilities. Two zero-days have been discovered
Read the original article: Patch Tuesday (August 2020): Microsoft patches 120 vulnerabilities. Two zero-days have been discovered Microsoft’s August 2020 Patch Tuesday security updates are now out. This month, the company has released patches for 120 vulnerabilities. Among them, there…
Netwalker Ransomware Explained: What You Need to Know
Read the original article: Netwalker Ransomware Explained: What You Need to Know Even though ransomware has been around since 1996, it is as present of a threat today as it was two decades ago. The most chilling part is that…
Web Application Security – A Complete Guide
Read the original article: Web Application Security – A Complete Guide OCD or just very fond of structure, I must confess that I like pretty much everything around me to be in (a specific) order. Due to this habit, I…
Privileged Account Management 101: How Can Privileged Accounts Compromise Your Security
Read the original article: Privileged Account Management 101: How Can Privileged Accounts Compromise Your Security When it comes to privileged account management (PAM), you might want to know: – what is a privileged account? – does it have any connection…
Secure DNS and DNSSEC – Threat Intelligence in a Drifting E-Threat Landscape
Read the original article: Secure DNS and DNSSEC – Threat Intelligence in a Drifting E-Threat Landscape The modern e-threat landscape (threatscape) has, once again, changed. We are no longer besieged by new (and dangerous) malicious strains, but by truisms. The…
DNS Security 101: The Essentials You Need to Know to Keep Your Organization Safe
Read the original article: DNS Security 101: The Essentials You Need to Know to Keep Your Organization Safe DNS Security alludes to the protection measures that involve the DNS protocol. As you may already know, the DNS (Domain Name System)…
Cloud Computing Threats: Beyond Vulnerabilities
Read the original article: Cloud Computing Threats: Beyond Vulnerabilities When you hear the term cloud computing, know that it has little to do with the famous cloud number 9 some sing about – it is a key concept in the…
Intune vs. WSUS – Costs, Benefits, Ease of Use, and Deployment
Read the original article: Intune vs. WSUS – Costs, Benefits, Ease of Use, and Deployment Patching has certainly gained a lot of momentum ever since research has proven that ‘unattended’ apps and software can quickly lead to a data leak.…
What is Privileged Access Management (PAM)?
Read the original article: What is Privileged Access Management (PAM)? Privileged Access Management ensures business safety through privileged accounts monitoring, preventing external and internal threats that result from the improper use of admin rights. It is based upon the Principle…
What is Privileged Access Management (PAM)?
Read the original article: What is Privileged Access Management (PAM)? Privileged Access Management ensures business safety through privileged accounts monitoring, preventing external and internal threats that result from the improper use of admin rights. It is based upon the Principle…
Best IoT Security Management for your Business
Read the original article: Best IoT Security Management for your Business We might feel that technology plays a big part in our lives, always with our eyes on our phones or turning on the TV immediately after we got home…
Patch Tuesday (July 2020): Microsoft Fixes a 17-Year-Old Flaw Found in Windows DNS Servers
Read the original article: Patch Tuesday (July 2020): Microsoft Fixes a 17-Year-Old Flaw Found in Windows DNS Servers The recurring monthly security updates from Microsoft are now out. In the July 2020 Patch Tuesday, the Redmond giant released updates to…
Patch Tuesday (July 2020): Microsoft Fixes a 17-Year-Old Flaw Found in Windows DNS Servers
Read the original article: Patch Tuesday (July 2020): Microsoft Fixes a 17-Year-Old Flaw Found in Windows DNS Servers The recurring monthly security updates from Microsoft are now out. In the July 2020 Patch Tuesday, the Redmond giant released updates to…
What Is a Man-in-the-Middle Attack? How It Works and How to Stay Safe from It
Read the original article: What Is a Man-in-the-Middle Attack? How It Works and How to Stay Safe from It While the nature of cyberattacks is constantly changing, and our lives become more and more influenced – if not affected –…
Secure Video Conferencing 101 (For Business): Tools, Precautions and More
Read the original article: Secure Video Conferencing 101 (For Business): Tools, Precautions and More If a company aims to be modern, innovative and, ultimately, effective, if some of its goals are growth and even globalization, using the progress of technology…
Secure Video Conferencing 101 (For Business): Tools, Precautions and More
Read the original article: Secure Video Conferencing 101 (For Business): Tools, Precautions and More If a company aims to be modern, innovative and, ultimately, effective, if some of its goals are growth and even globalization, using the progress of technology…
5 Vulnerability Management Tools to Help Your Company Seek and Fix Security Gaps
Read the original article: 5 Vulnerability Management Tools to Help Your Company Seek and Fix Security Gaps I remember reading once that, in this world, you can’t be certain of anything, except, of course, death and taxes. We should also…
What is Patch Management?
Read the original article: What is Patch Management? You can’t control the emergence of cyber threats. But you can have complete control over your organization’s vulnerabilities and efficiently manage them. Bad patch management has been one of the reasons behind…
What is DNS Poisoning and How to Protect Your Enterprise Against it
Read the original article: What is DNS Poisoning and How to Protect Your Enterprise Against it Modern enterprise cybersecurity has evolved – that’s a true statement. If we were to travel back in time – say, 10 or 20 years…
All You Need to Know About DNS Spoofing to Keep Your Organization Safe
Read the original article: All You Need to Know About DNS Spoofing to Keep Your Organization Safe The DNS in and of itself has never been secure. Being created in the ‘1980s when the Internet was a complete novelty, security…
What is DNS Poisoning and to Protect Your Enterprise Against it
Read the original article: What is DNS Poisoning and to Protect Your Enterprise Against it Modern enterprise cybersecurity has evolved – that’s a true statement. If we were to travel back in time – say, 10 or 20 years –…
How Does A Brute Force Attack Work and How to Keep Your Organization Safe
Read the original article: How Does A Brute Force Attack Work and How to Keep Your Organization Safe TheCybersecurity has become a vital cog in any company, regardless of profile. Business-owners learned that malicious attacks and hackers are not be…
Patch Tuesday: Microsoft Has Issued Fixes for 129 Vulnerabilities
Read the original article: Patch Tuesday: Microsoft Has Issued Fixes for 129 Vulnerabilities Microsoft has released its monthly security updates, with 129 patched vulnerabilities. Thus, June 2020 has become the fourth month in a row when the tech giant issued…
Patch Tuesday: Microsoft Has Issued Fixes for 129 Vulnerabilities
Read the original article: Patch Tuesday: Microsoft Has Issued Fixes for 129 Vulnerabilities Microsoft has released its monthly security updates, with 129 patched vulnerabilities. Thus, June 2020 has become the fourth month in a row when the tech giant issued…
How Does A Brute Force Attack Work and How to Keep Your Organization Safe
Read the original article: How Does A Brute Force Attack Work and How to Keep Your Organization Safe TheCybersecurity has become a vital cog in any company, regardless of profile. Business-owners learned that malicious attacks and hackers are not be…
Ten Open-Source EDR Tools to Enhance Your Cyber-Resilience Factor
Read the original article: Ten Open-Source EDR Tools to Enhance Your Cyber-Resilience Factor Today’s e-threats have evolved. We, the digital denizens of the Internet, are faced with such intricately-crafted malware, that makes us ponder whether ‘tis better to abandon all…
Ten Open-Source EDR Tools to Enhance Your Cyber-Resilience Factor
Read the original article: Ten Open-Source EDR Tools to Enhance Your Cyber-Resilience Factor Today’s e-threats have evolved. We, the digital denizens of the Internet, are faced with such intricately-crafted malware, that makes us ponder whether ‘tis better to abandon all…
What Is EDR and Why Is It Important?
Read the original article: What Is EDR and Why Is It Important? Oftentimes, your organization’s endpoints can become key entry points for cyber attackers. With the evolution of workplace mobility and employees connecting to the Internet from their off-site endpoints…
What Is EDR and Why Is It Important?
Read the original article: What Is EDR and Why Is It Important? Oftentimes, your organization’s endpoints can become key entry points for cyber attackers. With the evolution of workplace mobility and employees connecting to the Internet from their off-site endpoints…
Patch Tuesday: Microsoft Fixes 111 Vulnerabilities. Some Allow Remote Code Execution and Admin Rights Abuse
Read the original article: Patch Tuesday: Microsoft Fixes 111 Vulnerabilities. Some Allow Remote Code Execution and Admin Rights Abuse The May 2020 Patch Tuesday security updates have recently been released, with 111 patched vulnerabilities related to 12 different Microsoft products,…
Patch Tuesday: Microsoft Fixes 111 Vulnerabilities. Some Allow Remote Code Execution and Admin Rights Abuse
Read the original article: Patch Tuesday: Microsoft Fixes 111 Vulnerabilities. Some Allow Remote Code Execution and Admin Rights Abuse The May 2020 Patch Tuesday security updates have recently been released, with 111 patched vulnerabilities related to 12 different Microsoft products,…
Patch Tuesday: Microsoft Fixes 111 Vulnerabilities. Some Allow Remote Code Execution and Abuse Admin Rights
Read the original article: Patch Tuesday: Microsoft Fixes 111 Vulnerabilities. Some Allow Remote Code Execution and Abuse Admin Rights The May 2020 Patch Tuesday security updates have recently been released, with 111 patched vulnerabilities related to 12 different Microsoft products,…
Back to Work After Lockdown: Cyber Risks of the Post-Pandemic Era
Read the original article: Back to Work After Lockdown: Cyber Risks of the Post-Pandemic Era In the wake of China lifting some of its lockdown restrictions in the Wuhan province, most of the world is looking forward to getting back…
What Are the Main Vectors of Attack in Cybersecurity and How Do They Work?
Read the original article: What Are the Main Vectors of Attack in Cybersecurity and How Do They Work? Today’s dangerous cyber landscape demands all businesses to position themselves ahead of cybercriminals in order to maintain their safety. This always starts…
Oil Industry Targeted by Elaborate Spearphishing Attacks Amid Fuel Crisis
Read the original article: Oil Industry Targeted by Elaborate Spearphishing Attacks Amid Fuel Crisis With the cost of fuel hitting a new historic low, experts fear that this may be the beginning of a crisis unlike the world has ever…
Oil Industry Targeted by Elaborate Spearphishing Attacks Amid Fuel Crisis
Read the original article: Oil Industry Targeted by Elaborate Spearphishing Attacks Amid Fuel Crisis With the cost of fuel hitting a new historic low, experts fear that this may be the beginning of a crisis unlike the world has ever…
Ensuring Data Security with Business Process Outsourcing Companies
Read the original article: Ensuring Data Security with Business Process Outsourcing Companies The business processing outsourcing industry is known for generating savings and top-quality services for their clients. Enterprises in the West started the trend and has since relied on…
Why a Reliable Firewall is Essential to Enterprise Security?
It’s no doubt in my mind that the threatscape has changed – new malicious strains rising to wreak havoc, traditional (and outdated) countermeasures failing, ML and AI stepping up to the plate to create actionable mediation (and remediation) strategies. In…
SECURITY ALERT: Twitter Data Cache on Firefox May Have Left Your Personal Data Visible on Shared Computers
Twitter recently revealed a data privacy issue caused by the way in which Mozilla Firefox cached data, meaning that the personal information of Twitter users may have been stored in Firefox’s cache. More specifically, private files shared via direct messages…