Millie
your market intelligence analyst
Search Results
Edit Save
159 results
Heimdal Security Blog (EU) 02/21/2020 09:20
Recently, a large Danish company was hit by Emotet, a highly popular and dangerous type of malware, which is causing extensive and disruptive incidents. Emotet acts as a downloader/dropper, with multiple features, and in many cases, plants a secondary payload (for instance, the TrickBot data stealer, which can, later on, initiate ransomware payloads within a […]. .
Heimdal Security Blog (EU) 02/13/2020 09:18
Isaac Asimov, one of the most influential science-fiction writers of all times, envisioned a future populated by sentient and ethically sound machines that have vowed never to let any harm fall upon a human. While we’re still far from hearing an intellectually uplifting conversation between a technophobic detective and a machine struggling to figure out […]. .
Heimdal Security Blog (EU) 02/07/2020 09:33
Heimdal™ Security’s cybercrime research unit has recently uncovered a criminal infrastructure that employs multiple domains in order to release malware into the wild. Despite the domains being taken offline, per request, the malicious software distributed through them appears to elude any known simple behavioral-based detection methodology. This type of malicious activity, which has yet to […]. .
Heimdal Security Blog (EU) 01/31/2020 10:57
Every online ‘novitiate’ begins with an exercise in security. By now, you must have stumbled upon alien-like concepts such as “SSL”, “TLS”, “handshake protocol”, “AES”, or “MD5-SHA-1”. To call them perplexing, would be a major understatement – unless you’ve majored in computer sciences or cryptography, of course. In seeing how many sysadmins or even simple […]. .
Heimdal Security Blog (EU) 01/22/2020 09:46
Over the past couple of years, increasingly more sysadmins have abandoned the more “traditional”, hands-on, approach to access and identity management in favor of IAG or Identity and Access Governance. The switch from hands-on to IAG is more than taking advantage of emerging technologies; one would call it an authentic epistemological shift; an out-with-the-old-in-with-the-new methodology. […]. .
Heimdal Security Blog (EU) 01/21/2020 09:49
A new malicious code is wreaking havoc in corporate IT networks by exploiting a 0-day vulnerability in Internet Explorer. Even if this browser is not the default one used by endpoints within your organization, you still have reason to be concerned. The malicious code gets into your systems through email and has the potential to […]. .
Heimdal Security Blog (EU) 01/21/2020 08:29
As organizations and their partners are increasingly becoming interconnected, cyber security risks can endanger all parties involved. And even when your business is protected by sophisticated security tools, you may never be certain your suppliers also have the same methods of protection in place. This is why should never ignore any potential supply chain cyber […]. .
Heimdal Security Blog (EU) 01/15/2020 08:57
Microsoft released its regular patches on the second Tuesday of the month, and as always, they included fixes for multiple vulnerabilities. Namely, 49 security bugs have been now fixed, out of which eight are considered to be critical. Rumors started to circulate before the patches were officially out and sources were saying that Microsoft was […]. .
Heimdal Security Blog (EU) 12/19/2019 10:32
A new phishing campaign disguised as package notification in on the rampage. Initially discovered in Denmark, the malicious venture targets users who opted for the delivery of online-ordered packages in or around December. The phishing attempt came to light when a Denmark cell user received the following SMS: The message reads: “We were unable to […]. .
Heimdal Security Blog (EU) 12/10/2019 08:56
Ransomware is experiencing a resurgence in the second half of 2019 and it will probably grow in 2020, which is about to begin, too. In perhaps the most disturbing ransomware development of the year, a newcomer has developed a novel strategy to bypass Antivirus detection. The Snatch ransomware starts its activity by rebooting Windows computers […]. .

Financial Services

Business Issues

Companies - Public

Companies - Venture Funded

Financial Results

Global Markets

Global Risk Factors

Government Agencies

Information Technologies

Job Titles

Legal and Regulatory

Political Entities

Sources

Strategic Scenarios

Trends

Hints:

  • Actions
    • Bookmark and Share: Allows you to Bookmark the page for easy future retrieval and sharing with colleagues
    • Email: Opens a pop-up window where you can write a message to the recipient of the email
    • Copy URL: Copies the URL of the requested document for pasting in an email or other document
    • Previous Versions: Only shown if essentially the same document has been republished
  • Saved Searches and Alerts
    • Save your search for later viewing & updates by clicking the blue "Save" button to the right of the search box. 

Click here for more info on Search Results.