According to a joint alert from CISA, the NSA, the FBI, and partner Five Eyes organizations, the Chinese cyberespionage group Volt Typhoon entered a critical infrastructure network in the United States and remained undiscovered for at least five years before…
Category: Heimdal Security Blog
Insider Data Breach at Verizon Affects Over 63,000 Employees
An insider data breach at Verizon has compromised the personal information of more than 63,000 employees, nearly half of the company’s global workforce. The telecommunications giant disclosed the incident in a Data Breach Notification with the Office of the Maine…
The 11 Best Identity and Access Management Tools (2024)
Demand for Identity and Access Management tools is booming. According to data website Statista, the market for this technology is set to reach over USD $43 billion by 2029 – almost triple the 2022 level. Today, there are dozens of…
Ransomware Payments New Record Exceeds $905 Million Peak by over 11%
New Chainalysis warns of ransomware payments raised above above $1.1 billion in 2023 and reached a new record. The $983 million previous peak was set in 2021, while in 2022 the ransomware payments dropped to $567. Chainalysis puts the unusual…
Free & Downloadable Cybersecurity Incident Response Plan Templates
An effective cybersecurity incident response plan (IRP) can be the difference between a minor disruption and a major crisis. This article provides you with comprehensive IRP templates in PDF, Word, and Google Docs formats to ensure your organization can quickly…
AnyDesk System Breach Raises Concerns Among MSP Users
AnyDesk confirmed recently that a cyberattack has affected their product systems. The hackers accessed the source code and private code signing keys. Initially, the 170,000 customers remote access software company claimed an unplanned maintenance to explain why client logins failed…
Free & Downloadable Cybersecurity Risk Assessment Templates
Securing digital assets has never been more critical. This guide offers direct access to indispensable cybersecurity risk assessment templates in PDF, Word, and Google Docs formats, enabling organizations and individuals to fortify their digital defenses effectively and efficiently. What are…
A Guide to Effective Cloud Privileged Access Management
Over the last decade, the cloud has gone from being a radical, disruptive new technology to becoming the default setting for organizations of all shapes and sizes. The days of enterprises and heavily regulated companies citing security as the main…
Main Types of Patch Management Solutions: A Decision-Making Guide
Choosing between the different types of patch management solutions impacts the effort your IT team must make to keep the system safe. There’s no one-size-fits-all with patch management software, so you’ll need to evaluate your company’s profile first. Once you…
Privileged Accounts 101: Everything You Need to Know
Privileged accounts are one of the most common entry points for hackers. The profusion of accounts in an organization and the difficulty of managing them creates a unique target for malicious actors. Securing these accounts, therefore, is a key tenent…
Cloudflare Falls Victim to Cyberattack Leveraging Credentials from Okta Breach
Cloudflare disclosed a security breach today, revealing that a suspected nation-state attacker infiltrated its internal Atlassian server. The attack, which began on November 14, compromised Cloudflare’s Confluence wiki, Jira bug database, and Bitbucket source code management system. How did attackers…
Heimdal Partners with Jupiter Technology to Distribute Cybersecurity Solutions in Japan
We have partnered with Jupiter Technology Corporation, who will distribute our cybersecurity products across Japan as part of a long-term sales and distribution agreement. Jupiter Technology will sell the Heimdal XDR Unified Security Platform, marketed as the ‘Heimdal Security Suite’.…
Top 11 Privileged Access Management Solutions (2024)
Looking to find the right privileged access management (PAM) solution for your organization? Well, you’ve certainly come to the right place… PAM tools play a key role in any modern cybersecurity strategy. Without them, you can’t hope to protect yourself…
10 Best Privileged Identity Management Tools (2024)
The Importance of Choosing the Right Privilege Identity Management Solution The essence of effective Privileged Identity Management (PIM) lies not in identity or management but in privilege. A robust PIM system focuses on identifying those who should, and equally importantly,…
Free and Downloadable Threat & Vulnerability Management Templates
Threat and Vulnerability Management plays a crucial role in safeguarding information systems. It involves identifying, assessing, and mitigating vulnerabilities in software, hardware, and organizational processes. Effective TVM not only anticipates and counters potential cyber threats but also ensures compliance with…
Keenan Data Breach Puts Personal Data Of 1.5 Million People at Risk
Keenan data breach exposes sensitive data belonging to 1,509,616 individuals. The insurance broker company notified the impacted customers and employees on January 26th, 2024. According to the data breach notification, the hackers gained access to Keenan`s network on August 21st,…
Cactus Ransomware behind Schneider Electrics Data Breach
Cactus Ransomware claims responsibility for the January 17th Schneider Electric data breach. Schneider Electric confirms hackers got access to their Resource Advisor cloud platform. The French-based energy giant says the attack only hit their Sustainability Business division. The platform holds…
Heimdal® Launches Partner NEXUS: A Unified and Global Partner Program for Collective Success
The Heimdal Partner NEXUS program is now live. NEXUS, or the ‘Network of Excellence, Unity, and Safeguarding’ is a global initiative designed to enhance cybersecurity partnerships. Tailored for resellers, distributors, and MSP/MSSPs, it aims to improve customer security and expand…
10 Best User Access Review Software (2024)
With data breaches on the rise, it’s important to limit access to your organization’s sensitive data. A user access review software can help you do so. This article provides you with a comprehensive overview of the 10 best User Access…
CISA and FBI Reveal Known Androxgh0st Malware IoCs and TTPs
CISA and FBI released an advisory on Androxgh0st malware IoCs (Indicators of Compromise) and warned about hackers using this threat to steal credentials. The advisory contains: a list of specific Androxgh0st IoCs examples of malicious activities linked to it details…
Akira Ransomware Attacks Surge. Finnish Companies Among Targets
The National Cyber Security Centre Finland announced a surge in Akira ransomware attacks. Threat actors used Akira malware in six out of the seven ransomware attacks reported in December 2023. The attackers used VPNs that lacked multi-factor authentication. They exploited…
White House Revamps Cybersecurity Hiring Strategy
During his initial statements since becoming the National Cyber Director in December, Harry Coker stated that the White House plans to “reduce unnecessary barriers” that federal contractors have while trying to fill cybersecurity positions, such as the need for a…
Comprehensive Guide to Patch Management Templates
We all know that maintaining up-to-date systems is crucial. Patch management plays a vital role in this process. This article serves as a hub for various patch management templates, each designed to streamline and enhance the efficiency of your patch…
How to Create an End-to-End Privileged Access Management Lifecycle
Key takeaways: Why privileged access management requires a continuous approach; The common pitfalls of poor privileged access management; How to create an effective, end-to-end privileged access management lifecycle. Privileged access management (PAM) is an essential tool of any modern cybersecurity…
A Heimdal MXDR Expert on Incident Response Best Practices and Myth Busting
I got to talk to Dragoș Roșioru, a seasoned MXDR expert, about incident response best practices and challenges. Get an in-depth understanding of the do’s and don’ts in incident response as Dragoș explains how to avoid the most common mistakes…
Widespread Vulnerability in SSH Servers: The Terrapin Attack Threat
The Terrapin attack, a newly identified security threat, jeopardizes nearly 11 million SSH servers that are accessible online. Originating from academic research at Ruhr University Bochum in Germany, this attack specifically targets the SSH protocol, affecting both clients and servers.…
Major Data Breach at HealthEC Affects Millions
HealthEC LLC, a leading provider in health management solutions, experienced a significant data breach, impacting approximately 4.5 million individuals. This incident affected patients who received care through one of HealthEC’s client organizations. The company’s population health management platform, used by…
Black Basta Buster Utilizes Ransomware Flaw to Recover Files
Security research and consulting firm SRLabs exploited a vulnerability in the encryption algorithm of a specific strain of Black Basta ransomware to develop and release a decryptor tool named Black Basta Buster. This tool, released in response to the activities…
Massive Fallon Ambulance Data Breach Impacts Nearly One Million People
Transformative Healthcare announces Fallon Ambulance data breach exposed sensitive information of 911,757 customers. Fallon ceased operations in December 2022 but is still responsible for a data storage archive that hackers targeted with ransomware. The ALPHV threat group a.k.a. BlackCat, claimed…
Data Breach Impacts LoanCare Customers
Over 1.3 million customers across the U.S. are being alerted by mortgage servicing company LoanCare that a data breach at its parent company, Fidelity National Financial, may have compromised their private information. With 1.2 million loans and $390 billion in…
Lockbit Ransomware Attack Affects Three German Hospitals
Katholische Hospitalvereinigung Ostwestfalen (KHO), a German hospital network, has confirmed that a cyberattack launched by the Lockbit ransomware group is the cause of recent service disruptions at three hospitals in its network. The attack occurred in the early morning of…
Comcast’s Xfinity Breached: Data of 36 Million Users Exposed
Citrix bugs caused a lot of problems throughout the year, and as we’re closing down 2023, it seems it’s not over. This time, Xfinity, Comcast’s cable television and internet division has been the victim of a data breach caused by…
Major Data Breach at ESO Solutions Affects 2.7 Million Patients
ESO Solutions, a key software provider for healthcare and emergency services, was the victim of a ransomware attack. This cyberattack led to unauthorized data access and encryption of various company systems. The breach, initially identified on September 28th, marked the…
NSA Releases 2023 Cybersecurity Year in Review Report
The National Security Agency (NSA) has unveiled its ‘2023 Cybersecurity Year in Review’. This document highlights the agency’s achievements in enhancing national security through cybersecurity. It emphasizes the value of NSA’s collaborations with U.S. government agencies, international allies, and the…
The Four Layers of Antivirus Security: A Comprehensive Overview
The antivirus software stands as a critical defense line against cyber-attacks. To fully understand how it operates, it’s vital to understand the four distinct layers of antivirus security. Each layer contributes to the detection and neutralization of threats, ensuring a…
FBI Disrupts BlackCat Ransomware Threat Group Activity – The Essential Facts
The U.S. Justice Department (DoJ) announced on December 19th that the Federal Bureau of Investigations had disrupted the BlackCat ransomware threat group’s activity. The FBI offered a decryption tool to more than 500 affected victims. They also encourage potentially unknown…
What is the EPSS score? How to Use It in Vulnerability Prioritization
The Exploit Prediction Scoring System (EPSS) is a data-driven tool highlighting what vulnerabilities hackers will likely exploit. EPSS was created by a group of experts at the Forum of Incident Response and Security Teams (FIRST). Its purpose is to make…
How to Complete an IT Risk Assessment (2023)
In a perfect world, you’d have the resources to defend yourself against every possible cybersecurity threat and vulnerability. The reality, however, is that even the largest organizations have limited resources to dedicate to cybersecurity. An effective security strategy, therefore, needs…
Unveiling the Dynamics of Cybersecurity- A Heimdal® Report
The purpose of Heimdal®’s exercise is to analyze the complex dynamics between endpoint-based attacks, code-based vulnerabilities, and cyberattacks that leverage DNS in an attempt to establish a baseline for detection and response framework. To this end, we have analyzed two…
New JaskaGO Malware Stealer Threatens Windows and MacOS Operating Systems
Security researchers discovered a new JaskaGO malware stealer that can infect both Windows and macOS. JaskaGO uses various methods to persist in the infected system. Researchers observed various malware versions impersonating installers for legitimate software like CapCut video editor, AnyConnect,…
LockBit Ransomware Targets German Energy Agency Dena
Dena, the reputed German Energy Agency, is said to have fallen victim to the notorious LockBit ransomware group. The Dena cyberattack was revealed through a post on the threat actor’s dark web platform, where they disclose data breach incidents and…
Lazarus Hackers Exploit 2-Year-Old Log4j Vulnerability to Deploy New RAT Malware
Researchers warn Lazarus threat actors still exploit known Log4j vulnerability to infect devices with new DLang malware strains. The new campaign, dubbed Operation Blacksmith, became active on March 23. Hackers target manufacturing, agricultural, and physical security companies that failed to…
Toyota Data Breach Compromises Customer`s Financial Data
Toyota Financial Services (TFS) reveals that hackers stole their customers’ sensitive data in the last cyberattack. In November 2023, the Medusa threat group claimed the Toyota data breach and asked for a $8,000,000 ransom. The company did not seem to…
How to build a cyber incident response team (a 2024 playbook)
This post is authored by Heimdal’s Valentin Rusu – Machine Learning Research Engineer and overall cybersecurity guru here at Heimdal. As an incident response manager himself, Valentin regularly coordinates security responses for companies of all shapes and sizes – including…
Heimdal Collaborates with Microsoft to Match Evolving Market Needs
Heimdal in partnership with Microsoft is addressing the needs of our customers and managed service providers through an advanced Next-Gen Antivirus (NGAV) upgrade. By leveraging Microsoft Defender and enhancing it with Heimdal Extended Threat Protection (XTP), our customers are shielded…
CyberLink Breached by North Korean Threat Actors in Supply Chain Attack
Notorious North Korean hacking group, Lazarus, breached Taiwanese multimedia software company CyberLink and trojanized an installer to instead push malware in a complex supply chain attack, with the possibility of a worldwide reach. Activity that may have been connected to…
Welltok Data Breach Affects Over 8.5 Million Patients
Welltok, a Healthcare SaaS provider, has issued a warning about a significant data breach that compromised the personal information of nearly 8.5 million patients in the U.S. This breach occurred due to a cyberattack on a file transfer program used…
Patch Management Guide
Patch management involves distributing and applying updates to various endpoints, which is crucial in fixing software vulnerabilities or unforeseen system interactions. 60% of cyber incidents leading to covert data theft link to absent, misconfigured, or incompletely implemented patches. A concerning…
How to Create a Cybersecurity Incident Response Plan?
Organizations that want to avoid a security breach or attack naturally do everything in their power to avoid it from happening in the first place. The more proactive and preventative work you do, the higher your chance of avoiding an…
Vulnerability Prioritization: How to Beat Patching Paralysis
Key Takeaways: Vulnerability prioritization is about deciding what to patch, and in what order. Many organizations use unsatisfactory methods when prioritizing patches. Learn how a holistic, risk-based approach to vulnerability prioritization can improve patch management. Find out how automated vulnerability…
Researchers Warn NetSupport RAT Attacks Are on the Rise
Researchers warn of an increase in NetSupport RAT (Remote Access Trojan) infections impacting education, government, and business services sectors. NetSupport Manager is a remote control and desktop management tool by NetSupport Ltd. Its initial role was to aid IT professionals…
Mac Systems Under Threat: ClearFake Campaign Deploys Atomic Stealer Malware
Threat actors target macOS systems with the Atomic Stealer malware in a new phase of the ClearFake campaign. Mac users are tricked into downloading the infostealer on their devices from fake browser updates. Hackers designed the Atomic Stealer (AMOS) malware…
What Is DNS Security and How Does It Work [A Comprehensive Guide]
The cybersecurity solution of the future must be proactive and holistic, designed to face the most modern forms of attack. This is what we here at Heimdal are devoted to achieving through our endpoint protection, detection, and response suite with…
Assigning User Privileges in Heimdal [It’s Easy]
Managing user privileges is a critical task for any organization. This article aims to guide you through the process of assigning user privileges in Heimdal, ensuring a secure and efficient management of your cybersecurity infrastructure. Key Takeaway Summary Understanding User…
The Challenges of Adopting ISO 27001 Controls: A Comprehensive Guide for CISOs and IT Administrators
When it comes to information security, ISO 27001 is of paramount importance. As CISOs and IT administrators, you’re likely familiar with its significance. However, the journey from understanding to effectively implementing ISO 27001 controls is not without challenges. This article…
How to Implement an Effective Mac Patch Management Strategy
An effective Mac patch management strategy involves following a series of well-planned steps and best practices. Patch management strategies are not just about bug fixes, closing vulnerabilities, and improving system performance. Meeting compliance requirements is also on the goals list. …
Heimdal Launches Unique AI Feature to Detect Email Fraud
Heimdal has launched “Outliers Detection”, an AI-powered feature that upgrades its Email Fraud Protection platform. This tool uses AI to proactively spot and stop email threats early, keeping businesses safe. Our method is both innovative one-of-a-kind. We use anomaly detection…
Patch Now! New Intel CPU Vulnerability Impacts Desktop and Server Systems
Researchers disclosed a new Intel CPU vulnerability that allows escalation of privileges, access to sensitive data, and denial of service via local access. CVE-2023-23583 has an 8.8 CVSS score and impacts various Intel desktop, mobile, and server CPUs. According to…
Truepill Sued Over Data Breach Exposing 2.3 Million Customers
Truepill data breach exposed sensitive information belonging to 2,364,359 people and risks multiple lawsuits. The B2B-focused pharmacy platform discovered the incident on August 31, 2023. They promptly launched an investigation and took additional security measures to contain the incident. However,…
Samsung UK Online Store Suffers Data Breach
Samsung Electronics has informed its customers about a data breach impacting those who shopped at the Samsung UK online store from July 1, 2019, to June 30, 2020. This breach resulted in unauthorized access to personal information. Breach Traced to…
FBI and CISA Issue Advisory on Rhysida Ransomware
Today, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have jointly issued a warning about the Rhysida ransomware group. This gang has been attacking various organizations in different sectors since May 2023. A detailed Cybersecurity Advisory (CSA) has…
35 Million LinkedIn Users’ Information Shared on Hacking Forum
A notorious hacker, previously involved in high-profile data breaches of InfraGard and Twitter, has now leaked a substantial LinkedIn database on a clear web hacking forum. The scraped LinkedIn database was leaked in two parts: one containing 5 million user…
The Most Common Healthcare Cyberattacks
In the wrong hands, medical data can be used for a variety of crimes, such as patient identity theft, clinician identity theft, extortion, tax fraud, insurance fraud, and more. Geopolitical agendas further complicate the threat landscape, as cyberattacks such as…
Daixin Threat Group Claims Ransomware Attack on 5 Hospitals in Ontario
Daixin Team claimed responsibility for the ransomware attack that impacted 5 hospitals in Ontario, Canada, on October 23rd. TransForm, the shared service provider of the five healthcare organizations, confirmed the ransomware attack. The stolen database contains information on 5.6 million…
Hackers Exploit Atlassian Vulnerabilities for Cerber Ransomware Attacks
Threat groups exploited two recent Atlassian Confluence vulnerabilities to deploy Cerber ransomware. On October 31st, Atlassian released security updates for both flaws and urged users to patch. Both flaws, CVE-2023-22518 and CVE-2023-22515, are ranked 10 which is the maximum risk…
New DDoS Attacks Waves. Cybersecurity Expert Robertino Matausch Explains HTTP/2 Rapid Reset
If you switched from using HTTP/1 to HTTP/2 you`re a possible target of massive DDoS attacks. Hackers started recently to exploit a key feature of the HTTP/2 protocol. The vulnerability was called CVE-2023-44487. The HTTP/2 Rapid Reset DDoS attacks that targeted…
The Threat Is Real. MacOS Patching Keeps Your Apple Safe
Any device that runs code is vulnerable to hacking and so are MacOS machines. They need patching just as any other endpoint. Most Apple users would swear that Macs are immune to viruses and other malware. The truth is they`re…
How To Break The Metrics Mirage in Vulnerability Management
Meet Jeff. He’s the CISO of a mid-sized financial services company – and it’s his job to keep the organization safe from security attacks. Every week, he checks the graphs and dashboards in his SIEM (security information and event management)…
Privilege Overreach, the Lurking PAM Security Threat
Managing privileged access to internal resources is a challenge for organizations worldwide. If left unaddressed, it could lead to data breaches, downtime, and financial loss. Statistics show that 80% of data breaches seem to be caused by misuse of privileged…
Silent Safeguards – The Essence of ISO 27001 Controls
ISO 27001, sometimes referred to as ISO/IEC 27001 is an international standard that addresses organizational information security. Issued in 2005 and with a second revision in 2013, the ISO 27001 standard describes the Information Security Management Systems requirements for global…
Non-Bank Financial Firms Are to Report Breaches in Less Than 30 Days
The U.S. Federal Trade Commission (FTC) requires all non-banking financial institutions to report data breaches to FTC within 30 days. The amendment to the Safeguard Rule refers to security incidents that impact more than 500 people. Samuel Levine, Director of…
Lockbit Targeted Boeing with Ransomware. Data Breach Under Investigation
On October 27th, Lockbit claimed to have breached Boeing and threatened to leak a massive amount of sensitive data. Three days later, the threat group removed the aircraft company`s name from the victim list. At first, hackers posted a message…
Toronto Public Library Under Cyberattack
Canada’s largest public library system reported a cyberattack that took down its website, member services pages, and limited access to its digital collections. The Toronto Public Library provides more than 12 million items across 100 branches to more than 1.2…
Separation of Privilege (SoP) 101: Definition and Best Practices
Separation of privilege is splitting up tasks and assigning rights to different parts of a system. It means that user privileges are segmented between various users and accounts, but you can also apply it to applications, system sub-components, tasks, and processes.…
Heimdal® Announces New Partnership with ResenNet, displacing ResenNet’s long-standing RMM provider, N-able
[Copenhagen, Denmark – October 2023] – Heimdal, the pioneer and leading provider of unified cybersecurity solutions, is thrilled to announce its latest strategic partnership with renowned Danish managed service provider (MSP) ResenNet. This collaboration marks a significant milestone in the…
European Governments Email Servers Targeted by Threat Actors
Since at least October 11, the Russian hacker organization Winter Vivern has been using a Roundcube Webmail zero-day vulnerability in attacks against think tanks and government agencies in Europe. According to security researchers, the cyberespionage group (also identified as TA473)…
12 Best Vulnerability Management Systems & Tools 2023
Industry reports highlight the urgency: malicious actors can exploit a vulnerability within just 15 days of its discovery (CISA). The longer you wait, the larger the target on your back grows. Without proper vulnerability management, your business not only risks…
Cybercriminals Target Senior U.S. Executives Using EvilProxy Phishing Kit
Threat actors use EvilProxy phishing-as-a-service (PhaaS) toolkit to target senior executives in the U.S. in massive phishing campaigns. EvilProxy is an adversary-in-the-middle (AiTM) PhaaS designed to steal credentials and take over accounts. It mainly targets companies in the banking, financial…
Hackers Breached Okta`s Customer Support System via Stolen Credentials
Okta announced that threat actors breached their customer support system and accessed some of their clients` files. Hackers used stolen credentials to intrude into the system. GitHub, Apple, Hewlett Packard, Zoom, FedEx, Mitsubishi Heavy Industries, etc. use Okta`s identity and…
US Energy Company Reveals How Akira Ransomware Compromised its Systems
BHI Energy, a US energy services company linked to Westinghouse Electric Company, has revealed specifics about a cyberattack on their systems. The Akira ransomware group is responsible for the breach that took place on May 30, 2023. As a division…
University of Michigan Faces Data Breach Impacting Many of its Affiliates
The University of Michigan recently announced a data breach that took place in August. Cyber attackers broke into the university’s network, gaining unauthorized access to systems containing data of students, applicants, alumni, donors, employees, patients, and research study participants. This…
What Are Booking.com Doing To Protect Customers From Huge Phishing Campaign?
A deceptive email from ‘Booking.com’ targeted a victim, demanding credit card details to confirm a hotel reservation. This approach, part of a broader campaign, caught the recipient off-guard, prompting them to reach out to us to report the incident. Booking.com…
What is Cybersecurity-as-a-Service (CSaaS) and How It Can Help Your Business?
As businesses have become increasingly susceptible to cyberattacks, the use of Cybersecurity-as-a-Service, or CSaaS, has become more important. In this article, I will outline what CSaaS is, and discuss some of the benefits it can offer to businesses. I will…
Vulnerability Management Metrics: It’s Time to Look Past the Metrics Mirage
When it comes to managing security vulnerabilities, it helps to know your enemy. That’s why businesses rely on a set of vulnerability management metrics to help quantify how resilient they are and better inform their decisions on how to respond.…
Cybersecurity And The Patching Paralysis Problem
Summary: With dozens of apps, systems and devices to keep up to date, many IT departments suffer from ‘patching paralysis’. Find out why patching paralysis happens, and how you can overcome it. Key takeaways: Patching paralysis is very common It…
Thousands of Cisco IOS XE Devices Compromised Due to Zero-Day Vulnerability
Over 40,000 Cisco devices running the IOS XE operating system have been compromised after threat actors exploited a recently disclosed vulnerability, tracked as CVE-2023-20198. At the time of writing this article, there is neither a fix nor a solution for…
Best Patch Management Software & Tools 2023
Choosing the best patch management tool boils down to what your organization needs. Consider how complex your IT setup is and how much you’re willing to spend. For instance, large companies with diverse operating systems and applications will need a…
What Is Phishing-as-a-Service (PhaaS) and How to Protect Against It
Phishing-as-a-service, or PhaaS, platforms have evolved from the classic phishing attacks as a business model. Less experienced hackers embraced the opportunity of leading several phishing campaigns without necessarily owning the technical abilities for it. In this article, we will define Phishing-as-a-Service,…
12 Best Windows Server Patch Management Software & Tools 2023
Considering the inherent complexity of the IT infrastructure, Windows servers stand as critical pillars for many enterprises. Their seamless function is vital, yet they’re susceptible to vulnerabilities. Robust patch management not only mitigates these risks but also ensures optimal performance,…
Employee Clicking on Phishing Link Leads to D-Link Data Breach
D-Link leading global networking equipment company admitted suffering a data breach. Threat actors gained access to the company`s system after an employee clicked on a phishing link. The company discovered the data breach after the threat actors posted about it…
Progress Software Under Legal and Financial Scrutiny After MOVEit Incident
Progress Software, the owner of the MOVEit file transfer tool, is dealing with dozens of class action lawsuits and investigations from U.S. agencies. This follows a significant security breach in May which led to the theft of a vast amount…
Women Political Leaders Summit Targeted with Backdoor Malware
The Women Political Leaders (WPL) Summit in Brussels, dedicated to the topics of gender equality and female leadership, became the target of a cyber-espionage campaign orchestrated by ‘Void Rabisu’. This group developed a replica of the official WPL site, leading…
XDR vs. EDR vs. NDR: A Comparison
Threat Detection and Response (D&R) Solutions are an important part of the cybersecurity strategy, especially in the face of escalating cyber attacks. These security tools have seen significant evolution, adapting to more sophisticated threats over time. Extended Detection & Response…
Fairfax Healthcare Company Announces Data Breach
Fairfax healthcare organization from the United States has disclosed a data breach that could have compromised the medical records of approximately 250,000 patients. The Virginia-based supplier of facial and dental services announced the conclusion of an investigation, which revealed that…
DarkGate Malware Spread via PDF Files Through Microsoft Teams and Skype
DarkGate, a piece of malware has been observed being spread via instant messaging platforms such as Microsoft Teams and Skype. How the Attack Works? In these attacks, a Visual Basic for Applications (VBA) loader script disguised as a PDF document…
DarkGate Malware Spreaded via PDF Files Through Microsoft Teams and Skype
DarkGate, a piece of malware has been observed being spread via instant messaging platforms such as Microsoft Teams and Skype. How the Attack Works? In these attacks, a Visual Basic for Applications (VBA) loader script disguised as a PDF document…
FBI, CISA: Beware of AvosLocker Ransomware Attacks
In a new joint cybersecurity advisory, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have released information on the AvosLocker ransomware gang, that has been linked to attacks against critical infrastructure sectors in…
Balada Injector Malware Hits More Than 17,000 WordPress Sites
A new Balada Injector campaign used known WordPress plugin and theme vulnerabilities to hack over 17,000 websites during September 2023. Threat actors exploited the CVE-2023-3169 cross-site scripting (XSS) vulnerability in tagDiv Composer. Composer is a tool for the tagDiv’s Newspaper…
XDR vs EDR – A Comparison
Cybersecurity purchasers and providers must adopt a new way of thinking in response to the more sophisticated cyber threats that keep emerging. The necessity for more thorough and integrated approaches to cyber security is highlighted by the fact that traditional…
What Is XDR (Extended Detection and Response)? Features, Benefits, and Beyond
As cyber attackers become more sophisticated, leveraging machine learning and other advanced techniques, the importance of robust XDR security solutions becomes paramount. But what exactly is XDR, and why is it crucial in today’s technology stack? Keep reading to find…