โŒ

Normal view

There are new articles available, click to refresh the page.
Before yesterdayHeimdal Security Blog

Guide to Third Party Risk Management: Dealing with Vendor Vulnerabilities

A recent ย study by Cybersecurity Dive shows that nearly all companies (98%) use software integrations with third-party vendors that have suffered breaches in the past two years. Since not a single company can maintain ops integrity by solely relying on in-house developed software, the stakes are higher than ever. In this article, weโ€™re going to [โ€ฆ]

The post Guide to Third Party Risk Management: Dealing with Vendor Vulnerabilities appeared first on Heimdal Security Blog.

Heimdalโ€™s 10th Anniversary โ€“ Our Finest Hours

12 March 2024 at 09:19

On Heimdalโ€™s 10th Birthday, we want to thank everyone who shaped our journey from 2014 to today, and the future. Ours is a story of perseverance, innovation, and the relentless pursuit of excellence through community empowerment. What better way to celebrate than by sharing that story with you? 2011 โ€“ Heimdalยฎ wins CTF Championship. Source: [โ€ฆ]

The post Heimdalโ€™s 10th Anniversary โ€“ Our Finest Hours appeared first on Heimdal Security Blog.

Thereโ€™s Something Phishy About Generative AI

The rise of GenAI (Generative AI) gives leeway to malicious content creators with 80% of all phishing campaigns discovered in the wild being generated by AI tools such as ChatGPT or similar. In this article, we are going to explore the latest phishing techniques that capitalize on GenAI. A new milestone in phishing Why is [โ€ฆ]

The post Thereโ€™s Something Phishy About Generative AI appeared first on Heimdal Security Blog.

โŒ
โŒ