Why Removing Admin Rights Closes Critical Vulnerabilities in Your Organization

You have surely heard before about admin rights. This article will shed some light on what are admin rights, what risks they pose to an organization’s security, the benefits of…

High severity Intel chip flaw left cars, medical and IoT devices vulnerable

The vulnerability can be exploited by attackers with physical access to the CPU to breach the security protocols and obtain sensitive information. Positive Technologies security researchers have identified a vulnerability…

Heimdal™ Security Feature on Irish Tech News Podcast to Discuss the Recent GLS Scam Insights

Copenhagen, November 16th, 2021 – Heimdal™ Security (Heimdal™) CEO Morten Kjærsgaard appeared on The Irish Tech News Podcast with Ronan Leonard to discuss the recent GLS Scam Campaign discovered by our SOC Team and…

High-Severity Intel Processor Bug Exposes Encryption Keys

CVE-2021-0146, arising from a debugging functionality with excessive privileges, allows attackers to read encrypted files. A security vulnerability in Intel chips opens the door for encrypted file access and espionage,…

Group Policy Objects: Definition, Types and Examples

Group Policy Objects, also known as GPOs, are basically a collection of rules, a virtual policy settings compilation. In this article, you’ll find what group policy objects are, how many…