Threat actors are exploiting publicly known exploits to chain together ServiceNow flaws in order to infiltrate government organizations and commercial companies in data theft campaigns. Security researchers monitored the malicious activity and identified multiple victims, including government agencies, data centres,…
Category: Heimdal Security Blog
[2024] 10 Qualys Alternatives That Should Be on Your Shortlist
Qualys is one of the leading vulnerability, patch, and compliance management providers. While Qualys has long been a leader in cloud-based cybersecurity (it launched in 1999), it’s not suitable for everyone. It can be expensive, its scanning process can be…
Russia-Linked Brute-Force Campaign Targets EU via Microsoft Infrastructure
Summary The European Union is experiencing a surge in brute-force cyberattacks on corporate and institutional networks, mostly originating from Russia, according to a Heimdal investigation. These attackers exploit Microsoft infrastructure, particularly in Belgium and the Netherlands, to avoid detection. Heimdal’s…
Heimdal Integrates with Autotask PSA to Elevate MSP Operations and Drive Market Expansion
LONDON, July 23, 2024 – Heimdal proudly announces its integration with Autotask PSA, a renowned Professional Services Automation tool developed by Datto, a Kaseya company. This new integration is poised to significantly enhance support ticket creation and management, driving productivity…
Major Outages Worldwide Caused by CrowdStrike Update
Many machines all around the world are at a halt. A faulty component in the latest CrowdStrike Falcon update is crashing Windows systems. The mass outage causes worldwide chaos, with major banks, healthcare companies, media outlets, logistic companies, and even…
Best DNS Software in 2024
Choosing the right DNS software can make a significant difference in your network’s speed, security, and reliability. With a variety of options available, finding the best DNS software for your needs in 2024 can be challenging. This guide will help…
The Complete Guide to Zero Trust Implementation
If you pay any attention to the world of cybersecurity, there’s a good chance you’ve heard the term ‘zero trust’ at some point over the last few years. In fact, the term is so ubiquitous that it’s often difficult to…
AT&T Data Breach Compromises 109 million Customers’s Information
Hackers got access to phone call and text message records belonging to roughly 109 million people in the AT&T data breach. The breaching of AT&T’s online database hosted in a Snowflake account happened in April 2024. What information did the…
Hackers Only Need 22 Minutes Since Disclosure to Exploit a PoC
Security researchers observed hackers exploiting a vulnerability only 22 minutes after releasing proof of concept (PoC). It is the case of CVE-2024-27198, an authentication bypass flaw in JetBrains TeamCity. The CVE has a 9.8 CVSS score, which is critical. Hackers…
Automated Incident Response: What You Need to Know
If you’re responsible for an organization’s cybersecurity, then the appeal of automated incident response is obvious. Any technology that speeds up breach response time, reduces your workload, and prevents attacks is going to tick a lot of boxes. The concept…