| |
| | | | Malware. We all fear it, we all hate it, and we all try to fight it. | | | It can steal, encrypt, or delete information, alter or hijack core computer functions, and spy on our computer activity without our knowledge or permission. As this nasty type of threat continues to evolve and spread itself across machines and mobile devices, the need for security education, awareness, and proactivity is more acute now than ever. Not to mention the daily challenges that new and more sophisticated variants like Denonia, ZingoStealer, and FFDroider pose to security experts. | | | Make sure you didn't miss any of the latest news in terms of malware, and check our new edition of Heimdal's threat hunting journal on April's most detected malware. We have also prepared gripping interviews and brand-new YouTube videos addressing the most dangerous cyber threats. | | | Enjoy! | | | | | | | | Cybersecurity Month in Review | | | | | | | | | | | | | | | | | | | Industrial Spy Market Advertised via Adware | | The recently launched marketplace Industrial Spy sells info stolen from compromised organizations while also "spoiling" its customers with stolen data that's free of charge. | | | | | | | | | | Best Virtual Desktop Solutions You Need in 2022 | | Desktop virtualization refers to a software solution that isolates the desktop environment and any related application software from the client device used to access the desktop environment. | | | XDR vs EDR – A Comparison | | Employees rely on mobile devices, home PCs, and laptops to access corporate networks for work, and XDR and EDR are two extremely effective protection approaches. But which one should you go for? | | | | | | | | | | | | | | This video will explain how ransomware happens, what types of ransomware attacks threaten businesses, what gangs are the most powerful, and how to stay safe. | | | | | | | | Morten Kjærsgaard sat down with CyberNews, a leading research-based online publication that educates and protects consumers around the world from complex security risks to discuss what the war in Ukraine will bring to the cybersecurity industry. | | | | | Find out what is the main purpose of cyberwarfare and the cybersecurity industry in the Russia vs Ukraine war. | | | | | | | | Top Malware(s) Detection: 1st of April – 30th of April | | | | | | | The early spring edition of Can you guess who's the winner of this year's (malware) egg hunt? If your answer was "trojan" then you're right – 20 trojan strains for the April 1st – 30th interval, totaling over 25,000 positive detections – a 24.24% decrease compared to March. Check out April edition of Heimdal™'s threat hunting journal. | | | | | | Tell us more about yourself and help us provide you with quality content that best fits your needs and interests. | | | | | | | Keep up with all things Heimdal™ by following us on: | | | | | | | | |
No comments:
Post a Comment