Cybersecurity Tools

Heimdal and Interbel Partner to Secure Spanish Businesses Against Rising Cyber Threats

BARCELONA, Spain, and COPENHAGEN, Denmark, January 20, 2025 — Heimdal, a leading cybersecurity company, has partnered with Interbel, a Spanish cybersecurity and Email value added distributor with over 27 years of experience. Together, they will deliver powerful and user-friendly cybersecurity solutions to businesses across Spain, addressing the rising challenges of sophisticated cyber threats and complex […]

The post Heimdal and Interbel Partner to Secure Spanish Businesses Against Rising Cyber Threats appeared first on Heimdal Security Blog.

News & Updates

15-Year-Old Hacker Diverts Ships in Mediterranean Sea for Fun

A 15-year-old hacker gained access to a number of online portals in Italy, allowing him to alter the routes of oil tankers and other ships in the Mediterranean Sea.

Most hackers today have financial goals as they try to compromise companies and other organizations, steal data, and lock out employees, in order to ask for ransom. But there was a time when hackers tried to break into secure locations just to see if they could. 

As it turns out, the same goes for the young adolescent from Cesena,

News & Updates

Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers

New research has uncovered security vulnerabilities in multiple tunneling protocols that could allow attackers to perform a wide range of attacks.
“Internet hosts that accept tunneling packets without verifying the sender’s identity can be hijacked to perform anonymous attacks and provide access to their networks,” Top10VPN said in a study, as part of a collaboration with KU Leuven professor
Cybersecurity Tools

Draft DPDPA Guidelines: What’s in it for Cybersecurity Leaders?

The Digital Personal Data Protection Act (DPDPA) is poised to redefine India’s cybersecurity and data protection landscape. The recent draft guidelines have sparked widespread discussions, especially among cybersecurity leaders responsible for safeguarding data and ensuring compliance. This blog explores the implications of the draft DPDPA guidelines, highlighting opportunities, challenges, and strategic priorities for cybersecurity leaders. […]

The post Draft DPDPA Guidelines: What’s in it for Cybersecurity Leaders? appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

Cybersecurity Tools

Formbook Phishing Campaign with old Payloads

Recently, Seqrite Lab saw a phishing campaign delivering formbook stealers through email attachments. Formbook, as seen since 2016, has evolved in many ways from stealth features to evasion techniques. Being sold on hacking forums as Malware as a Service, we can see a number of variants. While the evasion technique remains the same, multiple layers […]

The post Formbook Phishing Campaign with old Payloads appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

Cybersecurity Tools

7 Steps International Organizations Must Take to Defend Critical National Infrastructure

Critical national infrastructure (CNI) is at risk in countries across the globe. When attackers target CNI systems—which include power plants, emergency services, hospitals, and transportation—it can cause life-threatening disruptions. We’ve…

The post 7 Steps International Organizations Must Take to Defend Critical National Infrastructure appeared first on Cyber Defense Magazine.

Scroll to Top