Source: heimdalsecurity.com – Author: Cristian Neagu What to do if you don’t have the time, workforce, or knowledge to deal with Patch Management? We’ve got the...
Author:
Isolated Systems at Risk: How Threat Actors Can Still Infect Your Systems With Malware – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu You might think that an air-gapped network will keep you safer from attackers, and you are right. It’s pretty obvious...
Microsoft Teams Users Targeted by Russian Threat Group – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Microsoft believes that Microsoft Teams chats were used into coaxing users to share their credentials with threat actors. The available...
How to Prioritize Vulnerabilities Effectively: Vulnerability Prioritization Explained – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu What Is Vulnerability Prioritization? Vulnerability prioritization is the process of identifying and ranking vulnerabilities based on the potential impact on...
40,000 HRM Enterprises Clients Had Their Credit Card Information Stolen Following Cyberattack – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu HRM Enterprises, Inc., the owner of the US’s largest independent hardware store, was recently the victim of a cyberattack where...
U.S. Government Contractor Maximus Hit by Massive Data Breach – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu U.S. government service contracting giant Maximus has disclosed a data breach warning that threat actors stole the personal data (including...
What Is a Vulnerability Management Program? – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu What Is Vulnerability Management? Vulnerability Management refers to the security practices that proactively identify, prevent, mitigate, and classify vulnerabilities within...
What Is Vulnerability Scanning: Definition, Types, Best Practices – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu What Is Vulnerability Scanning? Vulnerability scanning is the process of discovering, analysing, and reporting security flaws and vulnerabilities. Alongside vulnerability assessment,...
Stolen Microsoft Key: The Impact Is Higher Than Expected – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Earlier this month, Microsoft and CISA disclosed a security incident and attributed it to the Chinese threat group Storm-0558. The...
P2PInfect: A New Worm Targets Redis Servers on Linux and Windows – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu P2PInfect is a new cloud-targeting, peer-to-peer (P2P) worm recently discovered by cybersecurity researchers, that targets vulnerable Redis instances for follow-on...
BlackCat and Clop Claim Cyberattack on Beauty Giant Estée Lauder – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Cosmetic conglomerate Estée Lauder has been listed on the data leak sites of two of the most active threat groups...
Adobe Releases Patches to Fix Three New ColdFusion Vulnerabilities – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Adobe released an emergency ColdFusion security update meant to fix critical vulnerabilities, including a new zero-day vulnerability. Adobe fixed three...
New Cloud Credential Stealing Campaign Targets Microsoft Azure and Google Cloud – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu In June 2023, a threat actor was linked to a cloud credential stealing campaign that targeted Microsoft Azure and Google...
BlueKeep: Understanding the Critical RDP Vulnerability – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu What Is the BlueKeep Vulnerability? BlueKeep is a software vulnerability that affects older versions of Microsoft Windows. Also known as...
What Is Vulnerability Assessment? – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Vulnerabilities are common to any business. And judging by the pace at which threat actors are advancing in their technologies,...
Cisco SD-WAN vManage Impacted by REST API Vulnerability – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu A vulnerability in the Cisco SD-WAN vManage management tool enables a remote, unauthenticated attacker to obtain read or restricted write...
What Is Vulnerability Management? – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu What Is Vulnerability Management? Vulnerability management is an ongoing risk-based approach to discovering, prioritizing, and mitigating vulnerabilities and misconfigurations. The purpose...
StackRot: A New Linux Kernel Flaw Allows Privilege Escalation – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu A new vulnerability has been found by security researchers. Dubbed StackRot, the Linux Kernel flaw is impacting versions 6.1 through...
CISA, FBI: A New Version of the Truebot Malware Is Actively Used in Attacks – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu A new warning was issued by CISA and the FBI! Organizations across the United States and Canada have been targeted...
Shielding Learning: The Power of Cybersecurity in Education – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu As schools and universities continue to rely heavily on technology, the risk of cyberattacks becomes increasingly alarming. With hackers getting...
New Malware Alert: EarlyRAT Linked to North Korean Hacking Group – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu A previously undocumented remote access trojan (RAT) has been discovered by security analysts. Dubbed ‘EarlyRAT’, the trojan is believed to...
New Proxyjacking Campaign: Cybercriminals Hijack Vulnerable SSH Servers – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu A new financially motivated campaign is actively targeting vulnerable SSH servers to covertly ensnare them in a proxy network. According...
UPS Discloses Data Breach Caused by an SMS Phishing Campaign – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Canadian clients of international shipping company UPS are being warned that some of their personal information may have been stolen...
Governmental Agencies Ordered by CISA to Patch Vulnerabilities Exploited by Russian APT Groups – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added six new security flaws to its KEV list on Thursday. Governmental...
Linux Patch Management: Benefits and Best Practices – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Compared to Windows, Linux it’s different in areas such as features, flexibility, operationality, and ease of use. Naturally, we can...
LockBit Ransomware Extorted $91 Million Dollars in 1,700 U.S. Attacks – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu In a joint LockBit ransomware advisory, U.S. and international cybersecurity officials reported that the group has successfully extorted over $91...
More 3CX Data Exposed! Third-Party Vendor to Blame for the Leak – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Sensitive 3CX data was exposed when a third-party vendor of the well-known Voice over Internet Protocol (VoIP) communications service 3CX...
Patch Tuesday June 2023 – 78 Flaws and 38 RCE Bugs Fixed – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu As per usual, Microsoft rolled out its monthly updates on the second Tuesday of the month. 78 flaws, including 38...
Clop Ransomware Is Likely Behind the MOVEit Zero-Day Vulnerability Attacks – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu The notorious Clop Ransomware gang has been looking for ways to exploit a now-patched zero-day in the MOVEit Transfer managed...
Warning: Lazarus Targets Windows IIS Web Servers For Initial Access – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu The notorious Lazarus Group of North Korean state-sponsored threat actors is currently targeting vulnerable Windows Internet Information Services (IIS) web...