Cybersecurity Tools

The Incidence of EvilExtractor Malware Rises Across Europe and the U.S.

The number of cyberattacks spreading EvilExtractor malware across Europe and the U.S. is raising. Researchers warn that threat actors used the data theft tool in a massive phishing campaign in March 2023. Hackers designed this malicious program to extract data and files from endpoints while targeting Windows operating systems. Details About EvilExtractor A company named […]

The post The Incidence of EvilExtractor Malware Rises Across Europe and the U.S. appeared first on Heimdal Security Blog.

Cybersecurity Tools

The ESG Manager role & the importance of Environmental, Social & Governance strategy

In this exclusive CyberTalk.org interview, Idan Eden, the ESG Manager for Check Point, shares her expertise on the rapidly growing importance of ESG in corporate decision-making. As a highly knowledgeable ESG Manager, Idan is at the forefront of this trend. She helps Check Point build an ESG strategy that not only reduces risks and enhances […]

The post The ESG Manager role & the importance of Environmental, Social & Governance strategy appeared first on CyberTalk.

Cybersecurity Tools

Threat Actors Can Use Old Routers’ Data to Breach Corporate Networks

Discarded routers that are for sale on the secondary market are usually improperly wiped, an experiment shows. Threat actors can reboot sensitive data that haven’t been completely erased from them. Cybercriminals can use information about network configuration and details about the initial owner to breach corporate networks or can sell them online. Details About the […]

The post Threat Actors Can Use Old Routers’ Data to Breach Corporate Networks appeared first on Heimdal Security Blog.

Cybersecurity Tools

How To Protect Your Online Identity In 2023

Learn how to protect your online identity in this post. The Internet is a powerful tool for businesses and individuals alike. But it can also be dangerous for people who don’t know how to keep their personal data safe. Identity theft is an escalating concern that causes billions of dollars in yearly losses. As scammers […]

The post How To Protect Your Online Identity In 2023 appeared first on SecureBlitz Cybersecurity.

Cybersecurity Tools

Greening your security: Earth Day tips for cyber security experts

EXECUTIVE SUMMARY: Celebrate Earth Day 2023! Cyber security professionals are recognizing the role that they can play in supporting environmental sustainability initiatives and realizing how sustainability intersects with cyber security. In considering the environmental impact of security-related initiatives, cyber security professionals can not only contribute to a more sustainable future, but also enhance the overall […]

The post Greening your security: Earth Day tips for cyber security experts appeared first on CyberTalk.

Cybersecurity Tools

US Medical Service Data Breach Impacts 2.3M People

Shields Health Care Group (SHCG), a medical service provider in the United States, announced a data breach that compromised the personal information of more than 2.3 million people. Shields reported the breach to the Maine Attorney General on April 19, 2023, after discovering that a cyberattack had exposed sensitive customer information stored on the company’s […]

The post US Medical Service Data Breach Impacts 2.3M People appeared first on Heimdal Security Blog.

Cybersecurity Tools

Stay Ahead of Cyberthreats with Proactive Threat Hunting

In today’s digital age, cyber threats are an ever-present danger to organizations of all sizes. From ransomware attacks to data breaches, the consequences of a successful cyberattack can be devastating. That’s why it’s essential for businesses to adopt a proactive approach to cybersecurity – and that means embracing Proactive Threat Hunting. But what exactly is […]

The post Stay Ahead of Cyberthreats with Proactive Threat Hunting appeared first on Heimdal Security Blog.

Cybersecurity Tools

Cybercriminals Abusing an Abandoned WordPress Plugin for Malicious Code Injection

Threat actors found a new method to inject malicious code into websites. They are now using an abandoned WordPress plugin, Eval PHP. The plugin is still available in the WordPress plugins repository and had approximately 4,000 malicious installations per day this month. The Abandoned Plugin Eval PHP enables site administrators to embed PHP code in […]

The post Cybercriminals Abusing an Abandoned WordPress Plugin for Malicious Code Injection appeared first on Heimdal Security Blog.

Cybersecurity Tools

Millions of Records With Sensitive Data Leaked by ICICI Bank

ICICI Bank, an Indian multinational valued at more than $76 billion, with over 5,000 branches operating across India and 15 other countries worldwide has leaked millions of records with sensitive data, including financial information and personal documents of the bank’s clients. The Indian government designated the ICICI Bank’s resources as a “critical information infrastructure” in […]

The post Millions of Records With Sensitive Data Leaked by ICICI Bank appeared first on Heimdal Security Blog.

Scroll to Top