Source: heimdalsecurity.com – Author: Cristian Neagu Looking to find the right privileged access management (PAM) solution for your organization? Well, you’ve certainly come to the right...
Author:
10 Best Privileged Identity Management Tools (2024) – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu The Importance of Choosing the Right Privilege Identity Management Solution The essence of effective Privileged Identity Management (PIM) lies not...
10 Best User Access Review Software (2024) – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu With data breaches on the rise, it’s important to limit access to your organization’s sensitive data. A user access review...
What Is Just-In-Time (JIT) Provisioning – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Key Takeaways: What Is Just-in-Time (JIT) Provisioning? How Does Just-in-Time (JIT) Provisioning Work? Key Components of JIT Provisioning Systems The...
What Is the Principle of Least Privilege (POLP)? – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Key highlights: What least privilege is and how it works; How sophisticated modern attacks occur; Best practices for effective least...
Threat Actors Leverage TeamViewer in Ransomware Attacks – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Threat actors are leveraging TeamViewer to gain initial access to the endpoints of organizations and attempt to deploy encryptors based...
How to Create an End-to-End Privileged Access Management Lifecycle – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Key takeaways: Why privileged access management requires a continuous approach; The common pitfalls of poor privileged access management; How to...
Framework Discloses Data Breach After Third-Party Got Phished – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Framework Computer announced the discovery of a data breach that exposed the private data of an unspecified number of its...
2024 Cybertrends with Morten (A Cybersecurity CEO) – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu In a recent insightful discussion with Morten, CEO of Heimdal®, we explored the key cybersecurity trends for 2024. From the...
Data Breach Impacts LoanCare Customers – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Over 1.3 million customers across the U.S. are being alerted by mortgage servicing company LoanCare that a data breach at...
Lockbit Ransomware Attack Affects Three German Hospitals – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Katholische Hospitalvereinigung Ostwestfalen (KHO), a German hospital network, has confirmed that a cyberattack launched by the Lockbit ransomware group is...
Comcast’s Xfinity Breached: Data of 36 Million Users Exposed – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Citrix bugs caused a lot of problems throughout the year, and as we’re closing down 2023, it seems it’s not...
How to Complete an IT Risk Assessment (2023) – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu In a perfect world, you’d have the resources to defend yourself against every possible cybersecurity threat and vulnerability. The reality,...
Ukraine’s Largest Telecommunication Provider Paralysed by a Massive Cyberattack – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Kyivstar, Ukraine’s main provider of telecommunication services, says that it’s been the target of a ‘powerful hacker attack’. The attack...
Lyca Mobile Affected by Cyberattack – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Lyca Mobile has released a statement about an unexpected disruption on its network caused by a cyberattack that may have...
PoC Exploits Released for Major Linux Flaw – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu On the majority of Linux distributions, proof-of-concept attacks for a high-severity vulnerability in the dynamic loader of the GNU C...
Industrial Control System (ICS): Definition, Types, Security – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu An industrial control system (or ICS) is a type of computer system that monitors and controls industrial processes and infrastructure....
Progress Software Releases Urgent Patches to Fix WS_FTP Server Vulnerabilities – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Progress Software, the developer behind the MOVEit Transfer file-sharing platform recently issued a patch for a maximum severity vulnerability in...
Why Organizations Struggle With Vulnerability Management? – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Where Do Organizations Struggle With Vulnerability Management? With over 60% of companies having been the victims of cyberattacks in the...
Apple Fixes 3 New Actively Exploited Zero-Day Vulnerabilities – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Apple released an emergency security update to patch three newly identified zero-days exploited actively by threat actors. The vulnerabilities affected...
New Threat Group: Sandman Targets Telecommunication Companies Across the World With Infostealers – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu A previously unknown threat group known as “Sandman” is making its presence felt. The group uses a modular information-stealing malware...
Two New York Hospitals Breached by the LockBit Ransomware Group – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu The notorious LockBit ransomware group claims to have breached two major hospitals from upstate New York, the Carthage Area Hospital...
Patch Management Policy: A Practical Guide – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu This post is also available in: Danish Patching, a highly necessary, yet sometimes neglected practice of resolving security risks related...
Cisco BroadWorks Is Affected by a Critical-Severity Vulnerability – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu The Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform are both affected by a serious vulnerability that...
Warning: RocketMQ Vulnerability Actively Exploited by Threat Actors – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a new critical-severity vulnerability to its KEV catalog. The issue is...
Sourcegraph’s Website Breached by Threat Actors – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Popular AI-powered coding platform Sourcegraph reveals that its website was breached this week due to a leaked site-admin access token....
SapphireStealer: A New Open-Source Information Stealer Malware to Look Out For – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu A new malware is gaining traction in the cyber world. Dubbed SapphireStealer, this open-source .NET-based information-stealing malware has been observed...
BlackCat Sphynx: The Ransomware Operation Evolves Once Again – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Researchers at Microsoft discovered a new version of the BlackCat ransomware. Dubbed ‘Sphynx’, this version embeds the Impacket networking framework...
Patch Management vs Vulnerability Management: A Comparison – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Patch management is nowadays a necessity for every company that wants to stay safe from cyberattacks, and to ensure that...
Ongoing Phishing Campaign Targets Zimbra Collaborations Email Servers Worldwide – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Zimbra Collaboration email servers worldwide are being targeted by threat actors. Recently, cybersecurity researchers have uncovered an ongoing phishing campaign,...