-
Heimdal Announces New Partnership with ITHealth to Reinforce Cyber Security for NHS Organisations
We are proud to announce a new partnership with ITHealth, a trusted cyber security provider to the NHS. This partnership expands ITHealth’s offerings by integrating Heimdal’s advanced capabilities into the ITHealth Dashboard. By combining Heimdal’s threat protection and mitigation features with the ITHealth Dashboard, NHS organisations can improve security operations and build greater resilience. Heimdal’s solutions…
-
Free & Downloadable HIPAA Compliance Policy Template
Understanding the complexities of HIPAA compliance can be daunting for any healthcare organization, regardless of its size. At Heimdal®, we understand the challenges you face in maintaining the privacy and security of Protected Health Information (PHI). That’s why we’re excited to offer you a comprehensive HIPAA Compliance Policy Template, available for free in three convenient…
-
Cybersecurity Silos Disrupt Your Defense. See How Unified Security Platforms Prevent it
Most organizations today use dozens – or even hundreds – of cybersecurity tools. In theory, that’s a good thing. There are hundreds of types of threats out there, so using specialized point solutions to address them individually makes a lot of sense. But the drawback of all these point solutions is that they tend to…
-
CISA: BianLian Ransomware Focus Switches to Data Theft
The FBI, the Australian Cyber Security Centre, and the U.S. Cybersecurity & Infrastructure Security Agency have issued a new advisory stating that the BianLian ransomware operation has changed its strategy and is now predominantly a data theft extortion gang. The same agencies issued a joint advisory in May that warned about BianLian’s shifting tactics, which…
-
VMware vCenter Users Risk RCE Attacks. Two Flaws Exploited in the Wild
Hackers are exploiting two VMware vCenter Server flaws, one of which is a critical remote code execution flaw. Both vulnerabilities received security updates in September 2024, but the initial patches didn’t solve the problems completely. Thus, in October, VMware released a new patch to close the RCE vulnerability. Now security researchers warn users that they’ve…
-
Application Allowlisting: Definition, Challenges & Best Practices
Imagine the scenario: an employee at your company has innocently decided to install an add-on to their browser to help with time management. Except there’s a catch. The browser extension has been hacked by cybercriminals, who can exploit it as a backdoor into your company’s systems. However, if your organization uses application allowlisting (also known…
-
New Glove Stealer Malware Bypasses Google Chrome’s App-Bound to Steal Data
The New Glove Stealer malware has the ability to bypass Google Chrome’s Application-Bound (App-Bound) encryption to steal browser cookies. The threat actors’ attacks employed social engineering techniques akin to those employed in the ClickFix infection chain, in which phony error windows included in HTML files attached to phishing emails deceive potential victims into installing malware.…
-
Free & Downloadable Cloud Security Policy Template
A well-structured Cloud Security Policy is no longer a luxury—it’s a necessity. To help you stay ahead, we’re offering a free, downloadable Cloud Security Policy Template designed to simplify your cloud security journey. You can download your template in PDF, Microsoft Word, or Google Docs formats, allowing you to choose the one that best fits…
-
Matrix-Breakout: 2 Morpheus
This is the second in the Matrix-Breakout series, subtitled Morpheus:1. It’s themed as a throwback to the first Matrix movie. You play Trinity, trying to investigate a computer on the Nebuchadnezzar that Cypher has locked everyone else out from, which holds the key to a mystery. VulnHub Go to Source