Heimdal
Latest Articles

Ransomware

Data security | INTERMEDIATE READ

Cybersecurity in Healthcare: An In-Depth Guide by Heimdal®

Explore key strategies and tools to safeguard sensitive medical data against emerging threats.

Cybersecurity News | QUICK READ

Black Basta Buster Utilizes Ransomware Flaw to Recover Files

A New Tool Can Now Recover Files Encrypted by the Black Basta Ransomware Group.

Cybersecurity News | INTERMEDIATE READ

Recent Ransomware Attacks

A List of Companies Affected by Ransomware [Updated 2023]

Ransomware | INTERMEDIATE READ

Phobos Ransomware: Everything You Need to Know and More

Phobos Ransomware Emerged in December 2018. Here’s What You Need to Know About It.

Ransomware | INTERMEDIATE READ

What Effect Does Firm Size Have on Ransomware Threats?

Exploring the Impact of Company Size on Ransomware Vulnerabilities.

Ransomware | QUICK READ

Ransomware Trends and Predictions for 2023 and Beyond

Navigating the Ransomware Landscape.

Cybersecurity Basics | INTERMEDIATE READ

Ransomware-as-a-Service (RaaS) - The Rising Threat to Cybersecurity

How to Stay Safe From Ransomware-as-a-Service.

Ransomware | INTERMEDIATE READ

Ransomware Vs. Malware: What’s The Difference?

Exploring Two Sides of The Cyber Threat Coin.

Endpoint security | QUICK READ

Short Staffed in Cybersecurity? It's Time for MXDR!

A Webinar Insight on the Solution for Overcoming Short Staffing in Cybersecurity.

Cybersecurity Basics | INTERMEDIATE READ

Double Extortion Ransomware: The New Normal

Navigating The Complex Landscape of Double Extortion Ransomware Attacks.

Ransomware | QUICK READ

Ransomware Prevention Checklist: Safeguarding Your Digital Assets

A Dual Approach to Ransomware Prevention for CISOs and Employees.

Ransomware | INTERMEDIATE READ

Locking Out Cybercriminals: Here's How to Prevent Ransomware Attacks

13 Actionable Steps to Prevent Ransomware Attacks.

Ransomware | INTERMEDIATE READ

Locky Ransomware 101: Everything You Need to Know

How Locky Ransomware Works and How to Stay Safe from It. Detection, Decryption and Safety Tips for Locky Ransomware.

Ransomware | INTERMEDIATE READ

The Road to Redemption: Ransomware Recovery Strategies for Businesses

Navigating The Aftermath of Ransomware Attacks.

Ransomware | QUICK READ

BlackCat Alphv Ransomware

Complex Ransomware with Efficient Algorithms.

Ransomware | INTERMEDIATE READ

Linux Ransomware Exposed: Not Just a Windows Problem Anymore

Exploring Linux Ransomware, Real-Life Examples, and Proactive Defense Measures.

Ransomware | QUICK READ

The Most Prevalent Types of Ransomware You Need to Know About

Understanding the Most Frequently Used Types of Ransomware Is More Important than Ever.

Ransomware | QUICK READ

Crypto-Ransomware: An A to Z Guide to What It Is and How to Protect Yourself

At a Time When Cryptocurrency Is Surging, Understanding Crypto-Ransomware Attacks Is Critical to Staying Safe.

Ransomware | INTERMEDIATE READ

Rackspace Ransomware Attack Update: What You Need to Know

Rackspace Ransomware Investigation Concluded: Here’s What We Know Now

Ransomware | INTERMEDIATE READ

Five Ways Heimdal® Can Help You Protect Against Ransomware Attacks

One Unified Cybersecurity Platform Against All Cyber Threats.

Ransomware | INTERMEDIATE READ

What Is Hive Ransomware & Who Is Behind It: A Detailed Analysis

Here’s All You Need to Know About Hive Ransomware Group.

Ransomware | INTERMEDIATE READ

What Are the Main Ransomware Attack Vectors?

Find Out About the Main Vectors of Ransomware Attacks and How to Keep Your Business Safe & Sound.

Industry trends | INTERMEDIATE READ

Ransomware Payouts in Review: Highest Payments, Trends & Stats

What Were the Biggest Ransomware Payments of all Time? Trends, Stats, & More

Ransomware | INTERMEDIATE READ

How Does Ransomware Spread? Here's What You Need to Know

As Ransomware Operators’ Tactics Evolve, It’s Critical to Understand how Ransomware Spreads to Protect Your Company.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats