How MikroTik Routers Became a Cybercriminal Target

The powerful devices leveraged by the Meris botnet have weaknesses that make them easy to exploit, yet complex for organizations to track and secure, researchers said. The routers leveraged by…

Credit Card Swipers Injected into WordPress Plugins

As the holiday season is approaching, more and more people to rush to finish their Christmas shopping without being aware of the fact that cybercriminals don’t take time off for…

How to back up your Gmail: The ultimate guide

A few years ago, I moved off of Office 365 and Outlook and onto Gmail. Many of you thought I’d regret the move, but I have to tell you that…

Top tools for mobile android assessments

Infosec Institute –  Infosec Institute –  We are living in an era where digital transformation has a vital role in our lives. With this expansion, some objects have become indispensable…

8 tips to protect company data sent via home internet connections

The U.S. is on track to break the single-year data breach record in 2021, according to the Identity Theft Resource Center (ITRC). That’s not even the whole story. For every…

Ramping Up Malware Hunting with Heimdal™

In one of my previous articles, I discussed AI and its critical role in today’s – and tomorrow’s – world, particularly in terms of cybersecurity. I’m certain that AI (and…

Enter the Heimdal™ Social Media Giveaway for a Chance to Win Holiday Goodies

Happy holidays from us to you! As the gift-giving season draws near, we are very excited to announce our first time ever social media giveaway! Make sure you follow us…

FBI: Cuba ransomware group hit 49 critical infrastructure organizations

The FBI has released a new notice about the Cuba ransomware, explaining that the group has attacked “49 entities in five critical infrastructure sectors” and made at least $43.9 million…

Compromise assessment or threat hunting? What do organizations need?

Organizations worldwide are undergoing rapid digitization to keep up with the fast-paced world we live in today. While it is a good initiative, cloud computing and remote work setup have…

Vulnerabilities Exploited for Monero Mining Malware Delivered via GitHub, Netlify

Trend Micro – Trend Micro – Vulnerabilities Exploited for Monero Mining Malware Delivered via GitHub, Netlify We looked into exploitation attempts we observed in the wild and the abuse of…