How Hackers Used Legitimate Software to Breach U.S. Federal AgenciesA phishing scam using legitimate remote monitoring and management (RMM) software was used to target at least...
Category: heimdalsecurity
Killnet Russian Hacking Group Launches DDoS Attacks on German Websites
Killnet Russian Hacking Group Launches DDoS Attacks on German WebsitesOn January 25th, Killnet Russian activist threat group put several German websites offline after performing a DDoS...
What Is an SEO Poisoning Attack and How Does It Affect Network Security?
What Is an SEO Poisoning Attack and How Does It Affect Network Security?SEO poisoning attacks have been on the rise in recent years, as more and...
Explaining Vulnerability Scanning: Definition, Types, Best Practices
Explaining Vulnerability Scanning: Definition, Types, Best PracticesThe ever-changing landscape of cybersecurity makes it harder for companies to keep up with the malicious intents of threat actors....
How to Choose Between Access Control Models? RBAC vs. ABAC vs. PBAC
How to Choose Between Access Control Models? RBAC vs. ABAC vs. PBACAs organizations are increasingly dealing with security concerns, there is a need for more sophisticated...
FBI Closes Down Hive Ransomware Gang: What Does This Mean for the Security Landscape?
FBI Closes Down Hive Ransomware Gang: What Does This Mean for the Security Landscape?Federal authorities have taken down a website run by a notorious ransomware gang...
Security Flaws Disclosed in Samsung’s Galaxy Store App for Android
Security Flaws Disclosed in Samsung’s Galaxy Store App for AndroidFlaws found in the Galaxy App Store gave attackers the ability to install apps without the user’s...
Aurora Infostealer Malware Deploys Shapeshifting Tactics
Aurora Infostealer Malware Deploys Shapeshifting TacticsOne of the most recent finds exposed the Aurora Stealer malware imitating popular applications to infect as many users as possible....
What Is Spyware, What It Does, and How to Block It?
What Is Spyware, What It Does, and How to Block It?We are sure that you already heard of spyware, but are you curious to dive deeper...
What Is Kerberos Authentication?
What Is Kerberos Authentication?As industry experts continuously predict that cybercrime will only get worse in the following years, we see that the digital world is keen...
Threat Detection and Response (TDR) – An Overview
Threat Detection and Response (TDR) – An OverviewThreat detection and response (TDR) is an increasingly important approach to security as organizations struggle to keep up with...
40 Windows CMD Commands that Will Make You Feel Like a Real Hacker
40 Windows CMD Commands that Will Make You Feel Like a Real HackerWindows’ celebrated CLI (i.e., Command-Line Interpreter) is, without a doubt, a treasure trove of...