Cybersecurity Tools

Best Patch Management Practices to Follow to Keep Your Business Secured

Patch management is an essential practice for businesses to maintain the security and stability of their IT infrastructure. Patches are released by software vendors to fix vulnerabilities and enhance performance, and failing to manage these patches can lead to security breaches and system failures. In this article, we will be discussing what are the best […]

The post Best Patch Management Practices to Follow to Keep Your Business Secured appeared first on Heimdal Security Blog.

Cybersecurity Tools

Cyber Incident Cripples UK Criminal Records Office

After weeks of silence, the UK’s Criminal Records Office (ACRO) has issued a statement saying that the issues with the website that have been ongoing since January 17 were caused by a “cyber security incident.” ACRO manages criminal record information, conducting checks on individuals as necessary to determine if they have any convictions, cautions, or […]

The post Cyber Incident Cripples UK Criminal Records Office appeared first on Heimdal Security Blog.

Cybersecurity Tools

MSI Breach Claimed By Money Message Ransomware Gang

A recent data breach affecting Taiwanese PC parts maker MSI (Micro-Star International) has been listed on the extortion portal of a new ransomware gang known as ‘Money Message’. The threat actors claim to have stolen source code from the company’s network. MSI is one of the most well-known names in the global hardware market, producing […]

The post MSI Breach Claimed By Money Message Ransomware Gang appeared first on Heimdal Security Blog.

Cybersecurity Tools

What Is a Software Restriction Policy?

In today’s digital age, it is crucial for businesses to protect their sensitive data and computer systems from cyber threats. One effective way of doing so is by implementing a software restriction policy. But what exactly is a software restriction policy? And how can it benefit your organization? In this article, we will explore the […]

The post What Is a Software Restriction Policy? appeared first on Heimdal Security Blog.

Cybersecurity Tools

What is an ‘island hopping’ attack? (and how to stop one)

EXECUTIVE SUMMARY: At the mention of island hopping, you’re likely dreaming about adventures in Hawaii, the Caribbean, or similar destinations with majestic views and white-sand beaches. In the context of cyber security, island hopping refers to a sophisticated type of cyber attack. This technique is used by attackers as a means of circumventing advanced cyber […]

The post What is an ‘island hopping’ attack? (and how to stop one) appeared first on CyberTalk.

Cybersecurity Tools

Designing Your Threat Hunting Framework from Scratch – Core Essentials

A threat hunting framework is a collation of data-driven adversarial scenarios, backed up by hypothetical, field-tested, or time-honored TTPs (i.e., Tactics, Techniques, and Procedures). Serving a wide array of security-wise needs such as baselining, forecasting, threat modeling, vulnerability discovery, and incident response optimization. In this article, we’re going to explore model-based threat hunting, go over […]

The post Designing Your Threat Hunting Framework from Scratch – Core Essentials appeared first on Heimdal Security Blog.

Cybersecurity Tools

Typhon Info-Stealing Malware Comes Back Harder to Detect

Threat actors upgraded Typhon info-stealer to a version that has improved evading features against analysis and anti-virtualization mechanisms. The new Typhon Reborn V2 malware is currently advertised on a dark web forum. Typhon was first discovered in August 2022 and at the moment the malware was a mix of info-stealer, keylogger, and crypto-miner. At first, […]

The post Typhon Info-Stealing Malware Comes Back Harder to Detect appeared first on Heimdal Security Blog.

Cybersecurity Tools

International Cyber Operation Shuts Down Notorious Genesis Market

A global law enforcement crackdown, dubbed Operation Cookie Monster, has led to the take down of one of the world’s biggest criminal marketplaces used by online fraudsters to buy passwords – Genesis Market. An FBI-led operation involving more than a dozen international partners seized Genesis Market on Tuesday, scuttling one of the most significant online […]

The post International Cyber Operation Shuts Down Notorious Genesis Market appeared first on Heimdal Security Blog.

Exit mobile version