Heimdal
Latest Articles

Forensics and threat hunting

Forensics and threat hunting | INTERMEDIATE READ

Nordic Users Targeted by National Danish Police Phishing Attack

Victims Cited to Court over Fake Infantile Cyberpornography Allegations.

Forensics and threat hunting | INTERMEDIATE READ

Dark Power Ransomware Abusing Vulnerable Dynamic-Link Libraries in Resolved API Flow

An Ongoing Investigation into Emergent Cryptolocking Ransomware Strain.

Cybersecurity Basics | INTERMEDIATE READ

Cyber Threat Hunting vs Incident Response: What's the Difference?

Learn Which Approach Is Best for Your Organization.

Forensics and threat hunting | INTERMEDIATE READ

Stay Ahead of Cyberthreats with Proactive Threat Hunting

What Is Proactive Threat Hunting and Why Do You Need It in Your Cybersecurity Strategy?

Forensics and threat hunting | QUICK READ

Heimdal® Launches Broad Investigation into Russian Cybercrime Trend

Russian Cybercrime Phenomenon Skyrockets Amidst Ongoing European Conflict.

Forensics and threat hunting | INTERMEDIATE READ

SIEM vs Log Management – Definitions, Features, Capabilities, and Deployment

SIEM and Log Management in Threat-Hunting and Incident Response.

Forensics and threat hunting | QUICK READ

Threat Hunting Journal – June 2022 Edition

Heimdal™ Security Monthly Malware Roundup

Forensics and threat hunting | QUICK READ

Open Source Threat Intelligence Platform - Best Alternatives for Your Company [2024]

Top 7 Open Source Threat Intelligence Platforms that Provide Real-time Updates on Global and Internal Security Threats.

Forensics and threat hunting | QUICK READ

Threat Hunting Journal May 2022 Edition

Top Malware(s) Detections: 1st of May – 27th of May

Forensics and threat hunting | QUICK READ

Threat-Hunting Journal April 2022 – Easter Edition

Top Malware(s) Detections: 1st of April – 28th of April

Forensics and threat hunting | QUICK READ

Threat Hunting Journal – March 2022 E.O.M Edition

Top Malware(s) Detection: 1st of March – 28th of March

Forensics and threat hunting | QUICK READ

Threat Hunting Journal February 2022 – End of the Month Roundup

Top Malware(s) Detection: 1st of February – 28th of February

Forensics and threat hunting | QUICK READ

Heimdal™ Threat Hunting Journal: January E.O.M Edition

Top Malware(s) Detection: 1st of January – 31st of January

All things Heimdal | INTERMEDIATE READ

Heimdal™ Security Threat-Hunting Journal: End of the Year Wrap-up in Malware

Top 20 Malware(s) Detection: November 1st – January 1st, 2022

Forensics and threat hunting | QUICK READ

DeepBlueMagic Ransomware Strain Discovered by Heimdal™ - New Ransomware, New Method

DeepBlueMagic, the New Ransomware on the Horizon. How the Strain Works.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats