Cybersecurity Tools

Balada Injector Infects Nearly 1 Million WordPress Sites

A malware distribution operation known as Balada Injector has been active since 2017, and it is believed that it has infected over a million WordPress sites. According to GoDaddy’s Sucuri, the massive campaign “leverages all known and recently discovered theme and plugin vulnerabilities” to compromise WordPress sites. The attacks have been observed to occur in […]

The post Balada Injector Infects Nearly 1 Million WordPress Sites appeared first on Heimdal Security Blog.

Cybersecurity Tools

3 Ways Attack-Based Phish Testing is Failing Us

Attack-based phish testing creates fear, anxiety, and doubt in end users.  It does not create awareness, harms IT, and misinforms management. Despite representing a billion dollar industry, traditional attack-based phish testing is fundamentally flawed. It causes untold problems for IT departments, individual users, and and Managed Service Providers. Studies have shown it can even lead to more clicks by end users! This article outlines the fundamental flaws in attack-based phishing. It goes on to outline improvements from educational, positive outcome phish testing assignments that teach users how to finally spot every phishing attack and delete or avoid it.
Cybersecurity Tools

Two New Emergency Patches from Apple

Apple is backporting two security patches released on Friday. The updated patches address zero-day vulnerabilities on iPhones, iPads, and Macs. Details About the Vulnerabilities The first flaw, tracked as CVE-2023-28206, is an out-of-bounds write issue. This bug may permit threat actors to execute arbitrary code with kernel privileges on unpatched devices using malicious apps. Apple […]

The post Two New Emergency Patches from Apple appeared first on Heimdal Security Blog.

Cybersecurity Tools

XDR vs MDR: A Comparison of Two Detection and Response Solutions

Ensuring an efficient threat detection and response (D&R) strategy for your organization is vital for every sector of its activity. But growing workloads and limited resources are only two of the problems you encounter in your search for the best solution. Although there are a variety of D&R tools, it can be difficult to pinpoint […]

The post XDR vs MDR: A Comparison of Two Detection and Response Solutions appeared first on Heimdal Security Blog.

Cybersecurity Tools

Healthcare on High Alert: The Alarming Rise of Cyberattacks on eInfra Sends Shockwaves Through the Industry – Are You Safe?

The world of healthcare is rapidly changing. Technological advancements expose organizations to cyber risks, including ransomware, malware, breaches, viruses, and vulnerabilities. The combination of poor cybersecurity practices, digital transformation in care delivery, operational touchpoints, and sensitive data storage makes the healthcare industry a prime target for cybercriminals. While there is no doubt that healthcare service […]

The post Healthcare on High Alert: The Alarming Rise of Cyberattacks on eInfra Sends Shockwaves Through the Industry – Are You Safe? appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

Cybersecurity Tools

SD Worx Shuts Down its UK & Ireland IT Systems Following Cyberattack

Belgian company SD Worx shut down all IT systems for its UK and Ireland services after suffering a cyberattack. The European HR and payroll management company services 5.2 million employees for over 82,000 companies. The company started notifying customers that its UK and Ireland division suffered a cyberattack leading them to shut down IT systems […]

The post SD Worx Shuts Down its UK & Ireland IT Systems Following Cyberattack appeared first on Heimdal Security Blog.

Cybersecurity Tools

Catches of the Month: Phishing Scams for April 2023

Welcome to our April 2023 review of phishing attacks, in which we explore the latest email scams and the tactics that cyber criminals use to trick people into handing over personal data. This month, we look at a scam targeting YouTube content creators, the traditional tax-related phishing campaigns that occur at this time of year and a new report highlighting a surge in email-based scams attacks. YouTube warns of monetisation scam Content creators on YouTube are being warned about a phishing campaign regarding an apparent “new monetisation policy”. Users can monetise their YouTube channel if they create original content, have 1,000

The post Catches of the Month: Phishing Scams for April 2023 appeared first on IT Governance UK Blog.

Cybersecurity Tools

Round-Robin DNS Explained. What It Is and How It Works

The Round-robin DNS is a load-balancing technique that helps manage traffic and avoid overloading servers. Multiple IP addresses are assigned to a single domain name; each time the domain name is resolved, the returned IP address is picked in a circular order. The method aims to distribute the traffic load evenly between the servers associated […]

The post Round-Robin DNS Explained. What It Is and How It Works appeared first on Heimdal Security Blog.

Cybersecurity Tools

Oldest Law Practice in NYC Hacked, over 90,000 Clients Impacted

Almost 90,000 clients’ personal information was compromised in the cyberattack on the prestigious law firm Cadwalader, Wickersham & Taft. The law firm informed its clients on March 30, 2023, that on November 15, 2022, an unauthorized third party acquired remote access to the firm’s computers. According to reports, the threat actors could extract sensitive information from […]

The post Oldest Law Practice in NYC Hacked, over 90,000 Clients Impacted appeared first on Heimdal Security Blog.

Scroll to Top