Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
HeimdalSecurity.com
Page 2
HeimdalSecurity.com
HeimdalSecurity.com
How to Create an End-to-End Privileged Access Management Lifecycle – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Cristian Neagu Key takeaways: Why privileged access management requires a continuous approach;...
HeimdalSecurity.com
Framework Discloses Data Breach After Third-Party Got Phished – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Cristian Neagu Framework Computer announced the discovery of a data breach that...
HeimdalSecurity.com
Google Workspace: Cybersecurity Friend or Foe? – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Vladimir Unterfingher Kevin Mitnick, once dubbed the World’s Most Famous Hacker said...
HeimdalSecurity.com
Sea Turtle Hackers Spy on Dutch ISPs and Telecommunication Companies – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Livia Gyongyoși Sea Turtle Turkish state-backed group changed to focus on internet...
HeimdalSecurity.com
Turkish Hackers Target Microsoft SQL Servers with Mimic Ransomware – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Livia Gyongyoși Threat actors use AnyDesk to install Mimic ransomware and exploit poorly...
HeimdalSecurity.com
Managed Service Provider (MSP) Best Practices: A Insider’s Guide – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Madalina Popovici MSPs have carved their way into the business environment by...
HeimdalSecurity.com
2024 Cybertrends with Morten (A Cybersecurity CEO) – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Cristian Neagu In a recent insightful discussion with Morten, CEO of Heimdal®,...
HeimdalSecurity.com
Protecting MSPs and Mid-Market Companies from ‘FalseFont’ Backdoor Attacks – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Adelina Deaconu A new backdoor, known as “FalseFont”, has been discovered and...
HeimdalSecurity.com
A Heimdal MXDR Expert on Incident Response Best Practices and Myth Busting – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Livia Gyongyoși I spoke with Dragoș Roșioru, a seasoned MXDR expert, about incident...
HeimdalSecurity.com
Widespread Vulnerability in SSH Servers: The Terrapin Attack Threat – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Madalina Popovici The Terrapin attack, a newly identified security threat, jeopardizes nearly...
HeimdalSecurity.com
Major Data Breach at HealthEC Affects Millions – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Madalina Popovici HealthEC LLC, a leading provider in health management solutions, experienced...
HeimdalSecurity.com
Black Basta Buster Utilizes Ransomware Flaw to Recover Files – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Gabriella Antal Security research and consulting firm SRLabs exploited a vulnerability in...
HeimdalSecurity.com
Massive Fallon Ambulance Data Breach Impacts Nearly One Million People – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Livia Gyongyoși Transformative Healthcare announces Fallon Ambulance data breach exposed sensitive information...
HeimdalSecurity.com
Data Breach Impacts LoanCare Customers – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Cristian Neagu Over 1.3 million customers across the U.S. are being alerted...
HeimdalSecurity.com
Lockbit Ransomware Attack Affects Three German Hospitals – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Cristian Neagu Katholische Hospitalvereinigung Ostwestfalen (KHO), a German hospital network, has confirmed...
HeimdalSecurity.com
Comcast’s Xfinity Breached: Data of 36 Million Users Exposed – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Cristian Neagu Citrix bugs caused a lot of problems throughout the year,...
HeimdalSecurity.com
NSA Releases 2023 Cybersecurity Year in Review Report – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Madalina Popovici The National Security Agency (NSA) has unveiled its ‘2023 Cybersecurity...
HeimdalSecurity.com
Major Data Breach at ESO Solutions Affects 2.7 Million Patients – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Madalina Popovici ESO Solutions, a key software provider for healthcare and emergency...
HeimdalSecurity.com
The Four Layers of Antivirus Security: A Comprehensive Overview – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Valentin Rusu MACHINE LEARNING RESEARCH ENGINEER The antivirus software stands as a...
HeimdalSecurity.com
FBI Disrupts BlackCat Ransomware Threat Group Activity – The Essential Facts – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Livia Gyongyoși The U.S. Justice Department (DoJ) announced on December 19th that...
HeimdalSecurity.com
New JaskaGO Malware Stealer Threatens Windows and MacOS Operating Systems – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Livia Gyongyoși Security researchers discovered a new JaskaGO malware stealer that can...
HeimdalSecurity.com
How to Complete an IT Risk Assessment (2023) – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Cristian Neagu In a perfect world, you’d have the resources to defend...
HeimdalSecurity.com
What is the EPSS score? How to Use It in Vulnerability Prioritization – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Livia Gyongyoși The Exploit Prediction Scoring System (EPSS) is a data-driven tool...
HeimdalSecurity.com
Ukraine’s Largest Telecommunication Provider Paralysed by a Massive Cyberattack – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Cristian Neagu Kyivstar, Ukraine’s main provider of telecommunication services, says that it’s...
HeimdalSecurity.com
Lazarus Hackers Exploit 2-Year-Old Log4j Vulnerability to Deploy New RAT Malware – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Livia Gyongyoși Researchers warn Lazarus threat actors still exploit known Log4j vulnerability...
HeimdalSecurity.com
Lyca Mobile Affected by Cyberattack – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Cristian Neagu Lyca Mobile has released a statement about an unexpected disruption...
HeimdalSecurity.com
PoC Exploits Released for Major Linux Flaw – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Cristian Neagu On the majority of Linux distributions, proof-of-concept attacks for a...
HeimdalSecurity.com
Access-as-a-Service: How to Keep Access Brokers Away from Your Organization – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Mihaela Popa An attacker’s access to the network is often traced back...
HeimdalSecurity.com
Drive-by Download Attack – What It Is and How It Works – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Mihaela Popa In today’s digital age, cybersecurity is more important than ever...
HeimdalSecurity.com
Security Information and Event Management (SIEM). What It Is and How It Works. – Source: heimdalsecurity.com
Source: heimdalsecurity.com - Author: Elena Georgescu Wondering what is SIEM, what are its benefits and limitations,...
Posts navigation
1
2
3
…
16
Latest News
Data Breach Today
Healthcare in The Cloud: Detecting and Overcoming Threats to Ensure Continuity & Compliance – Source: www.databreachtoday.com
20/07/2024
Data Breach Today
Banks and Airlines Disrupted as Mass Outage Hits Windows PCs – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Securing Healthcare: Minimizing Risk in an Ever-Changing Threat Landscape – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
The Cost of Underpreparedness to Your Business – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Measuring Your Data’s Risk – Source: www.databreachtoday.com
19/07/2024
Data Breach Today
Top ‘Privacy by Design’ Considerations for Medical Devices – Source: www.databreachtoday.com
19/07/2024