A new Netflix phishing campaign was brought to my attention so I decided to share the news with all of you. It’s true that are more pressing matters to be worried about in the times we’re living through. Healthcare systems…
Tag: Heimdal Security Blog
Traffic to Malicious Websites Spiking as more Employees Take Up Work from Home
Heimdal™ Security’s Incident Response and Research team have recently uncovered evidence of what could be a potentially dangerous campaign directed at employees working from home. With many cities under lockdown due to the COVID-19 pandemic, companies were mandated to allow…
Coping with Remote Work during the COVID-19 Pandemic: Tips, Tricks, and Actionable Advice
As the international health authorities struggle to contain the COVID-19 pandemic, more and more companies have begun to embrace the remote work style. It’s not everyone’s cup of tea, that’s for sure – a fact confirmed by not only by…
A Cybersecurity Guide for Small Businesses in Response to COVID-19
The ongoing COVID-19 pandemic has a significant effect on companies of all sizes around the world, with issues related to the supply chain, shutdowns, workforce shortages, and event cancelations. At the same time, this period can be lucrative for cybercriminals,…
Advantages of Distributed Workforce and Data under the COVID-19 Pandemic
As the COVID-19 pandemic engulf Europe, more and more cities have come under lockdown in desperate effort to stem the contagion. On Wednesday, Mette Frederiksen, Denmark’s PM has announced during a press conference that Copenhagen, along with all major city…
Patch Tuesday: Microsoft Releases 115 Security Updates, The Biggest Batch Ever Launched
Microsoft has released security updates that include 115 unique fixes for Windows, Edge, IE, Exchange Server, Office, Azure, Visual Studio, and Dynamics. Out of the 115 bug fixes, 26 are categorized as critical. If your company is running on Microsoft Windows, please take a few minutes to read…
SECURITY ALERT: New LinkedIn OneDrive Phishing Campaign Detected by Heimdal™ Security
Heimdal™ Security’s Incident Investigation and Response Department have recently discovered a new phishing campaign that aims to compromise LinkedIn accounts. The intel gathered so far, suggests that the malicious operation indiscriminately targets business and personal accounts in an attempt to…
SECURITY ALERT: TDC Phishing Campaign Spreads like Wildfire through Legitimate Google Ads
Heimdal™ Security’s Incident Investigation and Response Department have recently unearthed a new type of phishing campaign that randomly targets TDC customers. The forensic analysis performed on malicious samples retrieved from an anonymous client revealed that the perpetrator(s) lured in TDC…
Coronavirus Outbreak Compels More Companies to Endorse Remote Work Requests
As health authorities worldwide struggle to contain the coronavirus outbreak, numerous company owners have decided to implement voluntary work-from-home regimes, effective immediately. Coined the “largest remote work experiment” by Fortune, for all intent and purpose, the aim is to reduce…
Challenges in Software Security for IoT Devices (and How to Tackle Them)
The Internet of Things (IoT) is one of the trends in this phase of digital transformation. It is the core technology influencing self-driving cars, smart homes, and everything sophisticated around us. But what about the security for IoT devices? As…
Challenges in Software Security for IoT Devices (and How to Tackle Them)
The Internet of Things (IoT) is one of the trends in this phase of digital transformation. It is the core technology influencing self-driving cars, smart homes, and everything sophisticated around us. But what about the security for IoT devices? As…
How to Prevent a Botnet Attack from Compromising Your Business
If you’re one of our regular readers, you may have grown accustomed to our article series that address today’s most common cyber threats targeting organizations. In today’s blog post, I’m going to take a look at how a botnet attack…
Cyber Kill Chain (CKK) – APT Interception Methodologies and Advanced Malware Mitigation.
We are witnessing an epistemological shift in malware detection & mitigation methodologies. Spearheaded by Lockheed Martin, this initiative proposes a radically new approach – instead of dealing with a malicious attack in its aftermath & reinforcing the infrastructure after incursion…
Cyber Kill Chain (CKK) – APT Interception Methodologies and Advanced Malware Mitigation.
We are witnessing an epistemological shift in malware detection & mitigation methodologies. Spearheaded by Lockheed Martin, this initiative proposes a radically new approach – instead of dealing with a malicious attack in its aftermath & reinforcing the infrastructure after incursion…
Title: Cyber Kill Chain (CKK) – APT Interception Methodologies and Advanced Malware Mitigation.
We are witnessing an epistemological shift in malware detection & mitigation methodologies. Spearheaded by Lockheed Martin, this initiative proposes a radically new approach – instead of dealing with a malicious attack in its aftermath & reinforcing the infrastructure after incursion…
SECURITY ALERT: Emotet Infected A Large Danish Company
Recently, a large Danish company was hit by Emotet, a highly popular and dangerous type of malware, which is causing extensive and disruptive incidents. Emotet acts as a downloader/dropper, with multiple features, and in many cases, plants a secondary payload…
Emotet Infected A Large Danish Company
Recently, a large Danish company was hit by Emotet, a highly popular and dangerous type of malware, which is causing extensive and disruptive incidents. Emotet acts as a downloader/dropper, with multiple features, and in many cases, plants a secondary payload…
Machine Learning Business Breach (MBB): How Hackers can Use Artificial Intelligence (AI) to Break In
Isaac Asimov, one of the most influential science-fiction writers of all times, envisioned a future populated by sentient and ethically sound machines that have vowed never to let any harm fall upon a human. While we’re still far from hearing…
Heimdal™ Security Discovers Gangs Hiding Behind Multiple Domains to Avoid TTPC Detection
Heimdal™ Security’s cybercrime research unit has recently uncovered a criminal infrastructure that employs multiple domains in order to release malware into the wild. Despite the domains being taken offline, per request, the malicious software distributed through them appears to elude…
SECURITY ALERT: US Users Targeted with Corona Virus Phishing Attacks
A new Corona Virus phishing scheme is taking the Western world by storm. Especially in the United States, but also in the UK and Western Europe or parts of Asia, hackers are using the Corona Virus scare for their own…
Windows 7 End of Support: What Does It Mean for Your Organizations?
As you may already know, Windows 7 has officially hit its end of support. Starting with January 14, Microsoft will no longer be providing updates, security patches or new features to what was once the most popular operating system in…
What is Transport Layer Security (TLS)? Strengths and Vulnerabilities Explained
Every online ‘novitiate’ begins with an exercise in security. By now, you must have stumbled upon alien-like concepts such as “SSL”, “TLS”, “handshake protocol”, “AES”, or “MD5-SHA-1”. To call them perplexing, would be a major understatement – unless you’ve majored…
What Is the Country with Highest Digital Quality of Life?
The Digital Quality of Life, or DQL, study examines the gaps between citizens’ online experiences on a society-to-society basis. In almost every aspect of life, the digital world impacts everyone. From day-to-day commutes to workplace computing, smartphones and computers are…
The Trends in IT Security, As You See It
I wanted to share a few insights with all the CIOs, CISOs, IT managers out there, reading our blog, regarding the main trends in IT security and what we’ve learned from them. Many of you give us a lot of…
SECURITY ALERT: Microsoft Accidentally Exposed 250 Million Customer Support Records
On January 22, 2020, Microsoft reported a security breach that involved one of its customer databases. Between December 5 and December 31, 2019, a change made to the database’s network security group contained misconfigured security rules that allowed the exposure…
Access Governance Strategy and Technology: How to Plan It Well
Over the past couple of years, increasingly more sysadmins have abandoned the more “traditional”, hands-on, approach to access and identity management in favor of IAG or Identity and Access Governance. The switch from hands-on to IAG is more than taking…
SECURITY ALERT: 0-Day Vulnerability in Internet Explorer Is Abused in Targeted Attacks
A new malicious code is wreaking havoc in corporate IT networks by exploiting a 0-day vulnerability in Internet Explorer. Even if this browser is not the default one used by endpoints within your organization, you still have reason to be…
Supply Chain Cyber Security: What Are the Risks?
As organizations and their partners are increasingly becoming interconnected, cyber security risks can endanger all parties involved. And even when your business is protected by sophisticated security tools, you may never be certain your suppliers also have the same methods…
SECURITY ALERT: Microsoft releases critical security updates to fix major vulnerabilities
Microsoft released its regular patches on the second Tuesday of the month, and as always, they included fixes for multiple vulnerabilities. Namely, 49 security bugs have been now fixed, out of which eight are considered to be critical. Rumors started…
SECURITY ALERT: Microsoft releases critical security updates to fix major vulnerabilities
Microsoft released its regular patches on the second Tuesday of the month, and as always, they included fixes for multiple vulnerabilities. Namely, 49 security bugs have been now fixed, out of which eight are considered to be critical. Rumors started…