UnitedHealth confirms for the first time that over 100 million people had their personal information and healthcare records stolen during the Change Healthcare ransomware attack. Change Healthcare initially published a data breach notification warning in June, stating that a ransomware…
Tag: Heimdal Security Blog
Why Is Privileged Access Management (PAM) Important?
Is your organization planning to implement a privileged access management (PAM) solution? If you already have passwords, an anti-virus, and a firewall, you might be wondering why you need to implement another cybersecurity technology. This article will help you understand…
NotLockBit Ransomware Targets Both Windows and MacOS
Researchers warn that NotLockBit, a new malware family mimicking LockBit ransomware, can impact Windows and macOS systems. The malware appears to be the first fully functional ransomware targeting macOS systems, moving beyond previous proof-of-concept (PoC) samples. What is NotLockBit Ransomware…
CISA Proposes Stronger Security Requirements to Protect Sensitive Data
CISA pushes for stronger security requirements to safeguard sensitive personal and government-related data from foreign adversaries. The need to implement Executive Order 14117, signed by President Biden in February 2024, is what triggered the Cybersecurity and Infrastructure Security Agency’s (CISA)…
Microsoft Reveals Loss of Customer Security Logs for a Month
Microsoft is alerting business clients to a flaw that resulted in critical logs being partially lost for nearly a month. This puts at risk businesses who depend on this data to identify unwanted activity. Microsoft is alerting enterprise customers that…
Free & Downloadable User Access Review Policy Template – 2024
Managing access to sensitive systems and data is more crucial than ever. Organizations across all industries face significant challenges in ensuring that their security measures keep pace with the complexities of user access management. To address these challenges, we’ve developed…
Free & Downloadable User Access Review Policy Template – 2024
Managing access to sensitive systems and data is more crucial than ever. Organizations across all industries face significant challenges in ensuring that their security measures keep pace with the complexities of user access management. To address these challenges, we’ve developed…
What Are Managed Security Services: Benefits and Solutions
Managed Security Services (MSS) refers to outsourcing security functions to a specialized provider. All MSS main types aim to offer top technology and expertise at a convenient price. Not all of them are a good match to your company. Let’s…
CISA: Threat Actors Exploit F5 BIG-IP Cookies for Network Reconnaissance
The F5 BIG-IP Local Traffic Manager (LTM) module is used by threat actors to manage unencrypted persistent cookies, which the U.S. Cybersecurity and Infrastructure Security Agency (CISA) is alerting users to as a means of network surveillance. The advisory stated…
7 Privileged Access Management (PAM) deployment mistakes to avoid
Privileged Access Management (PAM) deployment isn’t always successful. And on Reddit, SysAdmins aren’t holding back: It’s overkill and I hate it PAM is expensive and difficult to implement I can say that it is hot garbage with every ounce of…