Source: heimdalsecurity.com – Author: Livia Gyongyoși XDR software collects and processes data from various security layers, networks, and endpoints in an organization`s IT environment. It is...
Author:
New HiatusRAT Malware Campaign Targets U.S. Defense Department`s Server – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Threat actors launched a reconnaissance attack against a server belonging to the U.S. Department of Defense, as part of HiatusRAT...
New Ivanti Zero-Day Vulnerability Allows Hackers to Access Sensitive APIs – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Researchers observed a critical Ivanti Sentry API authentication bypass vulnerability exploited in the wild. The flaw was dubbed CVE-2023-38035 and...
Threat Actors Leak 2.6 Million DuoLingo Users` Data on Hacking Forum – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Malicious actors exposed 2.6 million DuoLingo users` data on the dark web. The announcement posted on August 22nd made the...
Top Exploit Databases to Use in Bolstering Cybersecurity Posture – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Exploit databases are relevant intelligence sources for security specialists that need to keep an eye on the latest exploits and...
UK Electoral Commission Data Breach Exposes Information of 40 Million Voters – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși The UK Electoral Commission revealed a cyberattack that exposed the personal data of all registered voters between 2014 and 2022....
Downfall Vulnerability Exposes Intel CPUs to Data and Encryption Keys Stealing – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Downfall vulnerability impacts various Intel microprocessors and enables encryption keys, passwords, and other sensitive data exfiltration. The flaw was dubbed...
Patch Against Exploit Kits. Understanding How Threat Actors Target Your Defenses – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Exploit kits (Eks) are collections of exploits – pieces of code or sequences of commands – created to leverage vulnerabilities...
Eyes on IDOR Vulnerabilities! US and Australia Release Joint Advisory – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Cybersecurity agencies in Australia and the U.S. issued an advisory that warns about security flaws in web applications that could...
Staff at NHS Lanarkshire Exposed Patient`s Data on Unauthorized WhatsApp Group – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși The Information Commissioner’s Office (ICO) revealed that 26 staff members of NHS Lanarkshire shared patients` information on a WhatsApp group....
Hot Topic Announces Potential Data Breach Due to Stolen Account Credentials – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși The American clothing company Hot Topic announced they identified suspicious login activity on a series of Reword accounts. Hot Topic...
Terrestrial Trunked Radio System Vulnerable to Leakage and Message Injection – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Dutch researchers revealed 5 vulnerabilities in the Terrestrial Trunked Radio (TETRA) that could expose government organizations and critical infrastructure communication...
Norwegian Government`s System Breached over Ivanti EPMM Zero-Day – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși The Norwegian National Security Authority (NSM) revealed that threat actors exploited the CVE-2023-35078 zero-day vulnerability in Ivanti’s Endpoint Manager Mobile...
New Vulnerability Puts 926,000 MikroTik Routers at Risk! Users Urged to Patch – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Researchers found a critical ‘Super Admin’ privilege elevation vulnerability that impacts MikroTik devices. Over 900,000 RouterOS routers are at risk...
What Is Mobile Device Management? Role in Endpoint Security and Benefits – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Mobile device management (MDM) is software that enables IT teams to supervise and secure all mobile endpoints in a company`s...
New Severe Vulnerabilities Found in AMI MegaRAC BMC Software – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Security Researchers warn about finding new vulnerabilities in the AMI MegaRAC Baseboard Management Controller (BMC) software. The flaws, rated from...
Zero-Day Alert! Critical Flaw in Citrix ADC and Gateway Exploited in the Wild – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Citrix urged customers to patch NetScaler ADC and Gateway products after discovering a critical-severity zero-day vulnerability. The flaw was dubbed...
What Is Advanced Endpoint Protection. Key Features and Benefits – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Advanced Endpoint Protection (AEP) is an AI-powered cybersecurity toolkit that focuses on detecting and preventing unknown cyber threats from harming...
11 Million Patients` Data Stolen in HCA Healthcare Data Breach – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși HCA Healthcare, one of the largest health companies in the USA, announced on July 10th it was the target of...
Deutsche Bank, ING, and Postbank Customers` Data Exposed in Breach – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Deutsche Bank, ING Bank, Postbank, and Comdirect recently announced they suffered customer data leaks. Reportedly, the four European giant banks...
Zero-day Alert! Microsoft Unpatched Vulnerability Exploited in NATO Summit Attacks – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Microsoft warns that hackers are exploiting an unpatched zero-day present in several Windows and Office products. The bug enables malicious...
What Is a DNS Rebinding Attack? Vulnerabilities and Protection Measures – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși DNS rebinding compromises the way domain names are resolved and is a technique threat actors use in cyberattacks. In this...
New Meduza Infostealer Designed for Windows Collects Users’ and Systems` Data – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Security researchers discovered a new Windows-based data-stealing malware dubbed Meduza Stealer. The new info stealer allegedly has detection-evading features and...
LockBit Ransomware Attack Freezes Japan`s Largest Port Activities – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși The Russian-based threat group LockBit targeted the Port of Nagoya in a ransomware attack. Japan’s largest port is currently unable...
CISA Warning! 8 Actively Exploited Flaws in Samsung and D-Link Devices – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși The US Cybersecurity and Infrastructure Security Agency (CISA) added 6 flaws affecting Samsung smartphones to its Known Exploited Vulnerabilities Catalog....
How to Identify Phishing Emails and Prevent an Attack Using DNS Filtering – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Identifying phishing emails and preventing phishing attacks continue to raise serious challenges for any company’s IT team. Although it`s been...
Hackers Use PindOS Javascript Dropper to Deploy Bumblebee, IcedID Malware – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Threat actors use a new strain of JavaScript dropper that deploys malware like Bumblebee and IcedID and has a low...
New Mockingjay Process Injection Method Enables Malware Evade EDR Tools – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Researchers found a new process injection technique dubbed Mockingjay that enables hackers to bypass EDR solutions. The method allows threat...
Top Managed EDR Benefits That Reduce Cybersecurity Risk – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși In the ever-evolving landscape of cybersecurity threats, Managed EDR (MDR) enables organizations worldwide to safeguard their digital assets. During the...
Chinese Hackers APT15 Use New Backdoor Malware to Target American Ministries – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Researchers observed state-sponsored threat group APT15 using a new backdoor dubbed `Graphican`. The Chinese hackers used the new malware in...