In an era where cyber threats continue to evolve and grow in complexity, Heimdal has once again risen to the occasion and emerged as a leading force in the industry. Therefore, it is with great honor and gratitude that we announce Heimdal’s Threat Prevention Endpoint has been awarded the prestigious ‘Cloud Based Solution of the Year’ at the
The Cybersecurity and Infrastructure Security Agency (CISA) has updated its #StopRansomware guide to account for the fact that ransomware actors have accelerated their tactics and techniques since the original guide was released in September of 2020.
The #StopRansomware guide is set up as a one-stop resource to help organizations reduce the risk of ransomwar
Experts warn of a threat actor, tracked as CloudWizard APT, that is targeting organizations involved in the region of the Russo-Ukrainian conflict.
On March 2023, researchers from Kaspersky spotted a previously unknown APT group, tracked as Bad Magic (aka Red Stinger), that targeted organizations in the region of the Russo-Ukrainian conflict. The attacker
May 19, 2023 5 0 Author: Amanda Johnson Google Authenticator Synchronizes 2FA Codes With the Cloud Google shares news about expandi
In March 2023, we uncovered a previously unknown APT campaign in the region of the Russo-Ukrainian conflict that involved the use of PowerMagic and CommonMagic implants. However, at the time it was not clear which threat actor was behind the attack. Since the release of our report about CommonMagic, we have been looking for additional clues that would allow
As businesses increasingly rely on digital data storage and communication, the need for effective data security solutions has become apparent. These solutions can help prevent unauthorized access to sensitive data, detect and respond to security threats and ensure compliance with relevant regulations and standards.
However, not all data security solutions a
1 TLDR;
Microsoft is releasing an Azure AD integrated, built-in LAPS agent to Windows 10 and Windows 11 that can be controlled by Intune.
1.1 Problem Statement
Migrating Windows endpoints to Intune-only management left gaps in controllable settings. An alternative for traditional Local Administrator Password Solution (
“Cloud Services” are a wide range of services delivered on demand to organizations over the internet, designed to provide easy and affordable access to applications and resources, without the need for internal infrastructure or hardware. There are three basic types of cloud services: Software as a Service (SaaS) which is the most recognized and a very
In February 2023, a large-scale DDoS attack took down the websites of seven German airports. The coordinated attack, executed by “Anonymous Russia”, targeted several major Airlines, lasting for four hours. The attack caused an hour-long shutdown of services in seven airports across Germany, including Dortmund, Nuremberg, and Dusseldorf. Considering the damag
As cyber incidents rise and threat landscapes widen, more security tools have emerged to protect the hybrid cloud ecosystem. As a result, security leaders must rapidly assess their hybrid security tools to move toward a centralized toolset and optimize cost without compromising their security posture.
Unfortunately, those same leaders face a variety of chal
On March 20, 2023, Microsoft announced the successful completion of the Cloud Data Management Capabilities (CDMC) certification. As a proponent of wider industry standards, I was fortunate to be part of Microsoft’s executive team working to achieve this important milestone. Beginning in 2020, we collaborated with more than 300 executives from across the fina
Cybersecurity has made a lot of progress over the last ten years. Improved standards (e.g., MITRE), threat intelligence, processes and technology have significantly helped improve visibility, automate information gathering (SOAR) and many manual tasks. Additionally, new analytics (UEBA/SIEM) and endpoint (EDR) technologies can detect and often stop entire c
April 21, 2023 9 0 Author: Matthew Turner The Safest Cloud Storage for Your Security Most owners of computers and mobile devices ha
Researchers disclosed two critical flaws in Alibaba Cloud’s ApsaraDB RDS for PostgreSQL and AnalyticDB for PostgreSQL.
Researchers from cloud security firm Wiz discovered two critical flaws, collectively dubbed BrokenSesame, in Alibaba Cloud’s ApsaraDB RDS for PostgreSQL and AnalyticDB for PostgreSQL.
ApsaraDB RDS is a managed database hos
Office and Microsoft 365 tokens can add some interesting dynamics to Azure and Microsoft 365 services penetration testing. There are a few different ways of getting JWT tokens, but one (1) of the primary ways is through phishing. In this blog, we are going to explore strategies on gaining maximum efficiency with Office tokens, different toolsets, and
Announce
Share high-quality web security related articles with you:)