Source: heimdalsecurity.com – Author: Mihaela Marian The Mallox ransomware group, also known as TargetCompany, Fargo, and Tohnichi, has become increasingly active, signaling a significant shift in...
Author:
Critical Zyxel Firewall Vulnerability Exploited in DDOS Attacks – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian Multiple DDoS botnets have actively exploited a critical vulnerability discovered in Zyxel firewall models, as revealed by cybersecurity researchers. Tracked...
Why Removing Admin Rights Closes Critical Vulnerabilities in Your Organization – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian You have surely heard before about admin rights. This article will shed some light on what are admin rights, what...
The Crucial Role of Cyber Essentials in the UK Public Sector – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian The United Kingdom’s public sector is undergoing a digital transformation, relying increasingly on technology to enhance service delivery, streamline operations,...
Just-in-Time Access Explained. What It Means, Benefits and Best Practices of JIT – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian The concept of Just-in-Time Access has been around for decades but it is only recently that it has become popular...
Micro-Segmentation: Strengthening Network Security Through Granular Control – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian In the interconnected realm of digital technology, safeguarding cybersecurity has become an utmost priority for organizations. Traditional security approaches, such...
Zoom Vulnerabilities Allow Attackers to Escalate Privileges – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian Six high-severity and one low-severity vulnerability patches have been released by Zoom. These flaws, if left unattended, would allow threat...
International Diplomats Targeted by Russian Hacking Group APT29 – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian Russian state-sponsored hacking group ‘APT29,’ also known as Nobelium or Cloaked Ursa, has employed innovative tactics to target diplomats in...
Top Data Breaches in 2023: Alarming Incidents Impacting Companies – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian The year 2023 has witnessed a surge in data breaches and cyberattacks, posing significant challenges for organizations striving to safeguard...
RedEnergy Stealer Ransomware: A New Threat Targeting Critical Infrastructure – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian A new strain of ransomware called RedEnergy Stealer has recently emerged, posing a significant threat to critical infrastructure systems worldwide....
SMUGX Campaign Targets European Entities – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian In a recent cyberattack that has raised alarm bells across Europe, several entities in the region have become victims of...
Ransomware Attackers Dump Students’ Data Online After School Hacks – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian In a disturbing trend, ransomware gangs have escalated their malicious activities by targeting schools and subsequently dumping students’ private files...
Understanding Managed SIEM: Empowering Businesses with Proactive Security – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian Organizations face an ongoing battle to protect their sensitive data and critical infrastructure in today’s increasingly sophisticated digital world. Security...
8Base Ransomware Emerges from the Shadows – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian In May and June 2023, 8Base, a previously undetected ransomware threat, experienced a significant increase in its operations after remaining...
North Korean APT37 Exploits New FadeStealer Malware – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian The hacking group known as APT37, also referred to as StarCruft, Reaper, or RedEyes, has employed a new malware called...
Threat Actors Claim International Finance Corporation (IFC) Attack – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian The International Finance Corporation (IFC), a member of the World Bank Group and the largest development institution in the world,...
RedClouds APT Deploys RDStealer Against Remote Desktop – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian RedClouds is a recently uncovered cyberespionage and hacking campaign that uses RDStealer malware to steal data from drives shared over...
Strengthening Cybersecurity Defenses: Cyber Assessment Framework – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian In today’s interconnected world, where cyber threats are constantly evolving and becoming more sophisticated, it is imperative for organizations to...
New Russian APT Group Responsible for Wiper Attacks in Ukraine Exposed – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian Security researchers have made a public disclosure about the identification of a new Advanced Persistent Threat (APT) group associated with...
Private Data Compromised in Healthcare Breach – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian In a recent announcement, the Commonwealth Health System revealed that threat actors have successfully breached the computer network of a...
Royal Ransomware Gang Bolsters Arsenal with BlackSuit Encryptor – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian The testing phase of BlackSuit, a new encryptor developed by the Royal ransomware gang, has commenced. This encryptor bears striking...
Kimsuky Strikes Again: New Campaign Targets Credentials and Intelligence – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian Kimsuky, the notorious North Korean nation-state threat actor, has been linked to a social engineering campaign targeting experts on North...
Privileged Access Management (PAM) Best Practices – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian Privileged access management, PAM in short, is a crucial set of tools and technologies allowing organizations to maintain steadfast control and...
Application Control 101: Definition, Features, Benefits, and Best Practices – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian Application control is part and parcel of the larger cybersecurity landscape of access control, as outlined by the National Institute...
State-Sponsored Cybercrime Group`s Infrastructure Revealed – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian Researchers have uncovered previously unknown attack infrastructure used by Pakistani and Chinese entities operated by the state-sponsored group SideWinder. In a...
Ransomware in the Name of Charity: MalasLocker Targets Zimbra – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian A new ransomware operation has been observed hacking Zimbra servers to steal emails and encrypt files. Instead of demanding a ransom payment,...
Operation MEDUSA Brings Down ‘Snake’ – Russia’s Cyberespionage Malware – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian The Federal Bureau of Investigation disrupted a Russian government-controlled Snake malware network that compromised hundreds of computers belonging to NATO-member...
Linux Kernel Vulnerability Gives Cybercriminals Root Privileges – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian There is a new Linux NetFilter kernel flaw that allows unprivileged local users to escalate their privileges to root level,...
Fake Windows Update Used to Push Aurora Info-Stealer – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian The Aurora information-stealing malware was delivered through an in-browser Windows update simulation in a recent malvertising campaign. For more than...
Managed Threat Hunting: The Next Step from Traditional Cybersecurity – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian As the world becomes increasingly digital, cybersecurity threats continue to evolve and become more sophisticated. Traditional cybersecurity measures are no...