Heimdal™ returns with the May edition of our threat hunting journal. As you might have expected, king trojan reigns unhindered with over 16,000 positive detections. There are a couple of…
Tag: Advanced malware researches
Threat-Hunting Journal April 2022 – Easter Edition
What better way to remember Easter than drawing up a list of the malware Bunny’s most ‘interesting’ offerings? Can you guess who’s the winner of this year’s (malware) egg hunt?…
Threat Hunting Journal February 2022 – End of the Month Roundup
We once again return with yet another narrative about malware strains, detection, and (clever) ways to protect your company’s assets against said threats. Last month’s threat journal mostly pivoted on…
Emotet Malware Over the Years: The History of an Infamous Cyber-Threat
Malware strains come and go while Internet users become more and more accustomed to online threats being dealt with swiftly by competent authorities. But what happens when a Trojan constantly…
Vulnerability Assessment 101
A vulnerability assessment is a systematic study of security flaws in an information system. This endeavor examines whether the system is vulnerable to any known vulnerabilities, gives severity ratings to…
Heimdal™ Threat Hunting Journal: January E.O.M Edition
Heimdal™ Security’s threat hunting journal continues to bring you the latest in threat detection and malware prevalence. Just in case you’ve missed it, last month’s uncrowned malware king was the…
Heimdal™ Detection Telemetry Highlights Risk of Successful Cyberattacks Drop Amidst Volumetric Attacks Increase
During the course of a larger cybercrime investigation regarding attack & exfiltration methodologies, Heimdal™ Security’s SOC team has discovered that although cyberattacks have increased in volume, the odds of success…
Ryuk Ransomware: Origins, Operation Mode, Mitigation
What is Ryuk Ransomware? Widely known for targeting governments, academia, healthcare, manufacturing, and technology organizations’ cybersystems, Ryuk is a ransomware-as-a-service (RaaS) group that’s been active since August 2018. It typically encrypts data…