Linux and Container Security: Removing module dependencies

Bitdefender recently announced GravityZone Security for Containers, expanding our cloud ...

Bitdefender Achieves Highest Score in AV-Comparatives Security Report

We’re excited to announce that Bitdefender has been designated as a Strategic Leader in ...

Applying Operational Excellence in MDR

This is the final installment in our three-part blog series on how Bitdefender has built ...

Top 2022 Cybersecurity Predictions for the Healthcare Industry

The healthcare industry has been one of the most targeted industries over the past few years ...

Applying Operational Excellence in MDR

This is the second in a three-part blog series from Bitdefender on how we have built ...

The Proactive Guide to Small Business Cybersecurity Strategy

Just being reactive to cyber threats is the last thing a small business should do. It’s akin ...

What is an APT?

Between ransomware, phishing, social engineering attacks, BEC attacks and more, ...

Security Blueprint: Understanding the Sales Process & Technical Requirements

A solid security blueprint helps you provide customers with the knowledge and solutions they ...

Applying Operational Excellence in MDR

Part 1 – Defining operational excellence in cybersecurity This is the first in a three-part ...

Bitdefender Threat Debrief | December 2021

The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...

Bitdefender Issues Top 5 Cybersecurity Predictions for 2022

This year is coming to an end, and the cybersecurity community is working hard on ...

Supply Chain Security Threats - What SMBs Need to Know

Small and mid-sized businesses (SMBs) might not rely on the complex supply chains that ...

The AV Comparatives Leaderboard Is Not As Crowded As It Seems

Three things matter the most when defending an organization against cyber threats: ...

What is Cyber Insurance? (and how do I know if i need it?)

Part of the responsibility of being a leader in risk management or cybersecurity isn’t just ...

Log4Shell – The call is coming from inside the house

On December 9, 2021, Apache disclosed CVE-2021-44228, a remote code execution vulnerability ...

What is SASE?

Cybersecurity frameworks and models are incredibly important and provide a consistent set of ...

Tactical Threat Intelligence: How to shield data from advanced attacks

Struck by the reality of remote collaboration, companies had to rethink both their business ...

Technical Advisory: Zero-day critical vulnerability in Log4j2 exploited in the wild

On December 9, 2021, Apache disclosed CVE-2021-44228, a remote code execution vulnerability ...

The Top Cloud Threats that SMBs Need to Address

Small and mid-sized businesses (SMBs), like global enterprises, are relying more and more on ...

Security Advisory: Bitdefender Response to Critical Zero-Day Apache Log4j2 Vulnerability

On December 9, 2021, Apache disclosed CVE-2021-44228, a remote code execution vulnerability ...

Tactical Threat Intelligence: What is it and practical use cases

As digital technologies continue to become central to every industry, they foster greater ...

Retail Cybersecurity: Common Threats During the Holiday Shopping Season

With Black Friday past us and Cyber Monday turning into a Cyber Week — the holiday shopping ...

What's Included in a Security Blueprint?

Evolving cybersecurity threats and a crowded technology marketplace are seeing businesses ...

Bitdefender Threat Debrief | November 2021

The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...

Why Third-Party Testing is Critical for Informed Customer Decisions

With 400+ new threats discovered each minute and 30 billion threat queries validated daily; ...

Cloud-Native Security—What is it and Why it Matters

The term “cloud native” is turning up more and more in vendor promotions and news content, ...

The 7 Biggest Digital Threats of Black Friday and Cyber Monday

Cyber crime is causing more chaos than ever, and looms large for small business owners as ...

Bitdefender’s 20th Anniversary: A look at the past, present, and future through its people

We’re incredibly excited to celebrate Bitdefender’s 20th anniversary and thought we would ...

Small Online Retailers Face These Big Online Threats This Holiday Season

The holidays are the time that makes or breaks a large number of small online retailers, and ...

Cybersecurity in Banking: Bank hackers, ransomware, and more

The banking industry has famously been the target of many malicious hackers, leading to ...

How to Protect Distance Learning Against Cyber Threats

Terms such as distance learning, distance education, remote learning, cyber education, and ...

What is RaaS and why is it so dangerous?

It’s no secret that ransomware is quickly becoming the most dangerous threat to ...

Healthcare Cloud Security Explained

Years before the pandemic, the healthcare industry had already been busily digitally ...

The Future of the Container Security for SMBs

As more and more small and mid-sized businesses (SMBs) shift data and workloads to the ...

Nov 04, 2021

Bitdefender Celebrates 20 Years of Cybersecurity Leadership

November 2021 marks a special month for Bitdefender as we celebrate our 20th anniversary. It ...

Healthcare threat hunting must get proactive

There's been no slowdown when it comes to healthcare-related security breaches. For the 12 ...

Why cybersecurity departments need a vendor management policy

Organizations have more third-parties and vendors than ever before, so much so that it’s ...

Bitdefender Threat Debrief | October 2021

The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...

Building Cybersecurity Resiliency – An Interview with a Threat Forensic Investigator

The threat landscape is changing. Crimeware, a class of malware designed specifically to ...

What is EDR and why is endpoint security so important?

Cybersecurity leaders have a daunting task and have needed to increase the scope of their ...

Enhancing Cyber Resilience through Extended Detection and Response (XDR)

Summary Advanced attacks represent a challenge for organizations that are getting breached ...

Foiling Cybercrime Around the World - An Interview with a Cybercrime Investigator

The threat of ransomware has grown dramatically in recent years. The recent emergence of ...

Multi-Factor Authentication (MFA) and Other Cybersecurity Must-haves

Building up a robust security department and having a strong security posture doesn’t happen ...

How Quantum Computing Will Impact Cybersecurity

The field of quantum computing is still in its early stages, but the technology will be ...

Pitfalls To Avoid With Your Security Awareness Training (SAT) Program

If you’re tasked with securing your organization, your employees are usually one of the ...

Top SMB Security Tips for Cybersecurity Awareness Month

October is CyberSecurity Awareness Month. Many CISOs might argue that every month should be ...

Advanced Threat Protection in the Modern Age: An Interview with a Threat Hunter

These days, the line between our online and offline lives has become indistinguishable. Our ...

Why healthcare IoT requires stronger healthcare cybersecurity

The healthcare industry has gone through a dramatic technological transformation, one that ...

Top 5 Healthcare Cyber Attacks and Threats

Even before the novel coronavirus pandemic, which forced healthcare organizations to shift ...

Bitdefender Threat Debrief | September 2021

The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing ransomware news, trends, ...

Why Healthcare Cybersecurity is Needed to Address Rising Modern Threats

The healthcare industry has undergone a major transformation -  spurred and fast-tracked by ...

Email Phishing and Malware | Bitdefender Earns Top Marks in VBSpam Test

Bitdefender has once again earned the top ranking for email phishing, malware and spam ...

Small and Mid-Sized Businesses Need to be Prepared for Ransomware Attacks

Ransomware attacks are currently one of the fastest-growing cyber security threats affecting ...

Technical Advisory: Zero-day vulnerability in Microsoft MSHTML allows remote code execution

Quick overview Microsoft recently issued a warning for CVE-2021-40444, a zero-day remote ...

Security Issues and Risks of Cloud Computing for SMBs

For small and mid-sized businesses (SMBs), cloud computing services provide an easy and ...

Bitdefender Threat Debrief | August 2021

The Bitdefender Threat Debrief (BDTD) is a new monthly series analyzing ransomware news, ...

Narrowing the Cyber Security Skills Gap

The shortage of skills is one of the biggest current challenges facing the cyber security ...

Bitdefender Takeaways from Black Hat 2021

Black Hat has grown to be one of the cybersecurity industry’s most well attended and ...

Using the MITRE ATT&CK™ Framework to Test Your Systems

In recent years, no framework has become more prevalent than MITRE ATT&CK™, the acronym ...

Expanding security support for Azure VMware Solution

Azure VMware Solution (AVS) is designed, built, and supported by Microsoft and provides ...

New U.S. Government Website Provides Ransomware Resources for Organizations

The potential dangers of ransomware are top of mind for cyber security and IT leaders around ...

Why is Content Moderation for Email Security Solutions So Important?

As organizations expand their operations to multiple platforms, they must also manage the ...

Enhancing APT detection capabilities through Threat Intelligence

Advanced Persistent Threats (APTs) continue to produce challenges for security teams. The ...

The Growing Importance of Cloud Workload Security

A growing number of organizations are increasing their use of the cloud. These workloads, ...

Join Bitdefender at Black Hat 2021!

Come August, the Bitdefender team – along with some 20K security and InfoSec professionals – ...

Seven Steps Healthcare Providers Can Take Now to Shrink Their Security Skills Gap

Healthcare providers are operating in a time of extraordinary pressure. Whether it's ...

Jul 09, 2021

Want to get started with XDR? XEDR may be the best place to begin

Every three to five years a new cybersecurity technology term gets hyped. In 2021 it’s ...

Jul 05, 2021

Security Architecture considerations for Cyber Resilience - Threat Prevention

In an earlier blog this year, I compared the concepts of cybersecurity and cyber-resiliency, ...

Advisory on Kaseya VSA Ransomware Attack

Update: July 13, 2021 -- Kaseya issued a critical security update for VSA users that is ...

Jul 01, 2021

How to stay ahead of Ransomware

Ransomware remains a favorite among cybercriminals, who use it to block victims’ access to ...

Jun 29, 2021

When they ATT&CK, we will D3FEND | Business Insights Bitdefender

On June 22nd, MITRE released a new framework called D3FEND to complement the ...

Ransomware Remains a Major Threat—Here’s How Organizations Can Defend Themselves

Ransomware attacks are on the rise and costing companies millions of dollars, and ...

Jun 11, 2021

Who’s Responsible for Cybersecurity when You Work from Home?

The ability to work from home seems to have seeped into people's consciousness like it's ...

Jun 03, 2021

Assessing Your Security Gaps: On which side of the security tipping point do you fall? 

IT security teams face the challenge of a complex, evolving threat landscape  Threats are ...

May 27, 2021

Detecting and Stopping Malware Threats Within Your Content Delivery Networks

CDN providers and SaaS companies with content-sharing components (such as DropBox, ...

May 25, 2021

Bitdefender’s Position on Ransomware Attacks and Decryptors

This week Bitdefender was named in a press article regarding our decision to release a free ...

May 25, 2021

A Practical Approach to Cyber Resilience – Developing solutions (Part 3 of 3)

In the third and last part of the blog series on Practical Cyber Resilience, I will cover ...

May 21, 2021

Honoring Our 2021 CRN Women of the Channel

We did it! Five of our talented, channel focused ladies including Anamaria Diaconu, Heather ...

May 20, 2021

Breaking Down the May 2021 U.S. Executive Order on Cybersecurity: What it Means for Government, Private Sector, and IT Security Professionals

On May 12, 2021, U.S. President Biden signed the highly anticipated Executive Order (EO) on ...

May 19, 2021

Alert Fatigue: Security Teams Stop Chasing Ghosts and Low Impact Events

As new threats hit enterprise systems and light up enterprise security dashboards, security ...

May 18, 2021

Digital Transformation Shouldn’t Require a Security Transformation

It’s often asked, why can’t security innovate more?

May 17, 2021

It's Time Security Teams Begin Prep for Quantum Computing

It seems that every week new news breaks regarding the progress toward reaching practical ...

May 13, 2021

Abusing Legitimate Software to Avoid Detection – ‘NAIKON’ APT Caught Running Cyber-Espionage Campaign Against Asian Military Organizations

Advanced Persistent Threat (APT) groups are at the heart of today’s cyber-espionage efforts. ...

May 12, 2021

Infrastructure Attack Highlights That Ransomware Operators Are Aiming for Business Disruption

Ransomware continues to be the ultimate business disruptor. This week Colonial Pipeline, a ...

May 07, 2021

How can the MITRE Engenuity ATT&CK® EVALUATIONS help you reduce cybersecurity operational cost

Security operations are expensive! Hiring, training, and keeping a team of security analysts ...

May 05, 2021

Defending against Email Threats that Don’t Involve Malware

The threat landscape continues to evolve in terms of complexity Email is still the weakest ...

May 05, 2021

The Data Privacy Imperative—Organizations Worldwide Work Toward Being Compliant

Ensuring data privacy is now a worldwide concern, with many countries adopting data ...

Apr 26, 2021

The Curse of Telnet, an IoT Problem that Doesn't Want to Go Away

An unsecure communication protocol proves to be a headache in today's world Despite its age ...

Apr 23, 2021

Decoding the MITRE Engenuity ATT&CK® EVALUATIONS 2021 Results

On April 20th, the results of the latest round of the annual MITRE ATT&CK® Evaluation of ...

Apr 21, 2021

Content is Key, but Is Also a Door for Spreading Malware

Since the onset of the current health crisis, many systems have found themselves strained. ...

Apr 20, 2021

Considering Endpoint Detection and Response? What’s the best EDR choice for your business?

“We are our choices”  (John Paul Sartre) 

Apr 19, 2021

Considering McAfee Alternatives? Make Replacement an Upgrade

“When in doubt, choose change.”  (Lily Leung)   McAfee has agreed to sell its enterprise ...

Apr 15, 2021

Bitdefender Launches Major Enhancements to its Global Partner Program

The global cybersecurity landscape has changed dramatically over the past year due to the ...

Apr 12, 2021

DHS Official: Cybersecurity a "top priority" for Biden Administration

S. Secretary of Homeland Security details Federal Cybersecurity Strategy. Initial focus on ...

Apr 07, 2021

New Bitdefender Report Highlights Unique Security Challenges of 2020

Ransomware, banking malware, unwanted applications, and Android attacks all rose ...

Apr 02, 2021

New U.S. Federal Data Breach Disclosure Rules May Be Imminent — Here’s what it means

Executive order under consideration would expand what companies have to disclose security ...

Anti-Exploit Technology is Fundamental for Cloud Workload Security

All attacks include malicious activity, but not all attacks include writing malware to disk  ...

As Advanced Persistent Threats Grow, Businesses of All Sizes Must Prepare

Advanced Persistent Threats (APTs) are sophisticated, stealthy attacks designed to gain ...

Mar 29, 2021

EDR or MDR: Two Paths to Successful Security Defense

EDR and MDR represent two viable paths to achieving successful security defense Internal ...

Mar 25, 2021

Advanced Encryption will be Key to Future Cyber Security Efforts

Efforts have long been underway to create more advanced cryptography, and the market appears ...

Mar 25, 2021

A Practical Approach to Cyber Resilience – The five-step process (Part 2 of 3)

This is the second of a 3-blog series on Practical Cyber Resilience. In the first part, I ...

Mar 24, 2021

Businesses! Beware The Vengeful IT Contractor!

Attack wiped out 1200 of a company's 1500 Microsoft Office 365 accounts Always revoke the ...

Mar 23, 2021

Malware Delivered Via Cloud Services Rises

53% of Web traffic is now cloud-related, a 20% year over year increase. 61% of all malware ...

Mar 22, 2021

Big Enterprise IoT Device Security Considerations

Analysts expect the global IoT market to grow from about $212 billion in 2018 to about 1.3 ...

Mar 22, 2021

Supply Chain Attacks – Bitdefender’s Threat Intel Wizards Say Now’s the Best Time for Advanced Cybersecurity [Q&A]

Bitdefender data suggests IT teams face murky waters in 2021, as the disruptive shift to ...

Mar 19, 2021

What's the Most Vulnerable Type of Device in a Smart Home? You'll Never Guess

Mistaken assumptions about smart home cybersecurity lead to more problems We put much trust ...

Mar 11, 2021

Bitdefender’s Response to Microsoft Exchange Vulnerabilities and Recommendations for Organizations

We understand the public announcement of several critical zero-day vulnerabilities in ...

Mar 11, 2021

Bitdefender Stops 100 Percent of Advanced Threats -- Earns Four ‘Best Protection’ Awards from Leading Testing Firm

Add four more awards to Bitdefender’s growing trophy case! This week AV-TEST, one of the ...

Mar 11, 2021

Is Security at a Tipping Point? Should You Still Go It Alone?

Have we reached a tipping point where providing for your own cyber-defense no longer makes ...

Mar 11, 2021

Wearable Devices are on the Rise, Presenting New Security Risks

More people are using wearable devices such as smartwatches, in part because of the ...

Mar 10, 2021

A Practical Approach to Cyber Resilience – Part 1 of a 3 Part Series

In a previous blog, I looked at the key differences between cybersecurity and ...

Mar 08, 2021

A Focused Approach to the Common Interview Process

Filling positions in the information technology career field, particularly in cybersecurity, ...

Mar 04, 2021

Remote Work and the Long-Term Impact on Risk

83% of employers now say the shift to remote work has been successful for their company, ...

Mar 03, 2021

Technology Providers: Would You Rather be Blockbuster or Netflix?

Be the voice of authority by tracking market trends for your audience Connect content with ...

Mar 02, 2021

Proprietary Operating Systems Are Responsible for Most IoT Vulnerabilities

Bitdefender's telemetry shows a huge disparity in the number of culpable operating systems ...

Feb 25, 2021

Considering Endpoint Detection and Response? Level up your defenses with Bitdefender EDR

“The most damaging phrase in the language is 'We've always done it this way'.”  Rear Admiral ...

Feb 22, 2021

Are you ready for the post-spam era?

Augment your email security solution for today’s challenges.

Feb 22, 2021

Bolstering Industrial Cyber Security in the Age of IoT

Security for industrial infrastructures is likely to get more attention with the continuing ...

Feb 18, 2021

Misconfigurations: An Open Door to Compromise and Data Breaches

Endpoint misconfiguration accounts for 27 percent of entry points exploited by attackers ...

Feb 15, 2021

Toward the post COVID-19 Security Posture

As enterprises get comfortable with remote work, their priorities are going to shift. ...

Feb 12, 2021

Cloud Security Alliance Provides Enhanced IoT Security Guidance

As enterprises, and their home workers, deploy IoT devices, the risks these devices pose to ...

Feb 10, 2021

Bitdefender Leaders Honored as CRN Channel Chiefs

Bitdefender this week was pleased to announce that CRN, a top channel publication, named ...

Feb 09, 2021

Pajama-Clad Security: The Cyber Risks of Working from Home

A year ago, we would step into the office each morning, swipe our badge at reception, pass ...

Feb 04, 2021

Concerns about Security are Being Fueled by Shifting Business Priorities, Pandemic-Induced Remote Work, and Accelerated Deployment of New Technologies

Organizations’ concerns about cyber security, privacy, cloud, and technology resilience are ...

Jan 29, 2021

BEC Scammers Take Advantage of "Out-of-Office" Microsoft 365 Users

Fraudsters found a way during the recent holiday season to take advantage of users' "Out of ...

Looking for an alternative to Symantec Endpoint Protection?

“There are far better things ahead than any we leave behind.”  C.S. Lewis

Jan 25, 2021

Finance Sector Faces ‘Extreme but Plausible’ Cyber Threats

Financial services firms are major targets of cyber attacks A recent report describes six ...

Jan 25, 2021

The 2020 Year in Cybersecurity Review

When it came to healthcare security, 2020 proved to be a continuation of the state of ...

Jan 22, 2021

If the US President Can’t Secure His IoT Devices, Can You?

People’s homes are full of cameras and microphones, which in theory allow attackers to do ...

Jan 20, 2021

Q&A: Discussing Bitdefender Business Solutions Group’s Growing Momentum

Bitdefender’s Business Solutions Group came off an exceptional year of growth fueled in part ...

Jan 15, 2021

IoT Operates with a Security Deficit, but the Situation Is Not Hopeless

IoT manufacturers often favor speed of rollout over security Attackers don’t have to work ...

Jan 14, 2021

Pandemic’s Impact on Cyber Security is Far Reaching

An overwhelming majority of business and technology executives worldwide plan to shift their ...

Jan 06, 2021

Three Security Headaches in 2021 and the Technologies to Fix Them

Remote workers have become lucrative ground for lurking cybercriminals Scams purporting to ...

Jan 05, 2021

IT Leaders Rank Data Breaches as the Top Technology Risk for 2021

80% of digital leaders plan to address ‘cyber breach’ risk in 2021 audit plans IT leaders in ...

Jan 04, 2021

Study: 5 Key Factors are Influencing the Cyber Threat Landscape

Cyber criminals are changing their tactics to take advantage of emerging vulnerabilities, ...

Jan 03, 2021

Despite Rising Vulnerabilities, Majority of Organizations Don’t Perform Continuous Security Monitoring

Not enough organizations are continuously looking for risks in their IT assets. ...

Dec 30, 2020

Common IoT Threats and the Role of ISPs in Protecting Our Homes

To fix a problem you first need to know of its existence IoT devices are often the target of ...

Dec 29, 2020

Most Companies in US and Canada Gather User Data through Third-Party Code without Telling Customers, Survey Finds

Advertisers usually use gathered data to better target customers Most companies allow some ...

Dec 28, 2020

ICO Calls on UK Businesses to Ensure Lawful Flow of Data Under GDPR as Brexit Transition Period Ends

SMEs must check whether they are impacted before the end of the UK’s transition period with ...

Dec 25, 2020

Most Employees Think It’s the Company’s Job to Secure Their Work Accounts

59% of employed Americans are more concerned about creating a strong password for personal ...

Dec 24, 2020

Organizations Relied More in 2020 on Crowdsourced Cybersecurity, Report Finds

Companies need bug bounty platforms now more than ever The increase in the number of threats ...

Dec 23, 2020

Poor Security Habits Might Force Companies to Bring Employees Back to the Office

69% admit to using corporate devices for personal use 57% say they allow other members of ...

Dec 22, 2020

Bitdefender Looks Ahead at the Threat Landscape of 2021

As 2020 is finally and fortunately coming to an end, here at Bitdefender, we’re already ...

Dec 22, 2020

Most Industries Plan Substantial Investments in IT to Support Remote Workers in 2021

Organizations don’t want to be caught off-guard again by a COVID-like crisis Most industries ...

Dec 21, 2020

Bitdefender Endpoint Detection and Response, The Vaccine You Need for Advanced Threats

Advanced targeted threats are designed with a defined purpose to infect and remain ...

Dec 21, 2020

Half of Cybersecurity Seniors Have Changed Their Defense Strategies Due to COVID-19

23% admitted experiencing a remote attack or disruption since the beginning of the pandemic ...

Dec 18, 2020

61% of IT Security Leaders Say Remote Workers Have Caused a Data Breach This Year

Employees are 85% more likely today to leak files than pre-COVID 59% of IT security leaders ...

Dec 17, 2020

Bitdefender’s Response to FireEye and SolarWinds Breaches and Recommendations for Organizations

The recent breaches making headlines is a stark reminder that no organization is immune to ...

Dec 17, 2020

Half of Businesses Say Remote Work Pays Off, But Security Is Becoming a Major Concern

Nearly a quarter of organizations worry about security risks introduced by users working ...

Dec 16, 2020

How to Choose a Reliable Security Licensing Provider - Seven Steps for Your Integration’s Success

The security landscape, as well as the fast-growing market behind it, can be highly ...

Dec 16, 2020

No-code, Low-code Development: An Enterprise Priority With Data Risks

Demand for digital transformation is driving low code development platforms. While ...

Dec 15, 2020

Why Build When You Can Integrate? How Licensing Can Help Your Business Grow

While economies were slowed down by the recent health crisis, the same cannot be said about ...

Dec 15, 2020

New Spear-phishing Campaign Targets Office 365 Users

Attackers spoof the Microsoft.com domain Lookalike websites used to steal credentials ...

Dec 14, 2020

Should Businesses Be Concerned About Nation-State Threats?

With malware increasingly adopting the “as-a-service” business model, Advanced Persistent ...

Dec 14, 2020

FBI and CISA Roll Out Best Practices to Serve as a Cornerstone of Organizations’ Cybersecurity Strategies

Feds offer advice on how to build and maintain a strong cybersecurity posture in the face of ...

Dec 11, 2020

When the ISP Becomes the Weakest Link in the Cyberattack Kill Chain

People are not always the weakest link Trickbot was hit, but it’s operators are trying to ...

Dec 10, 2020

5G Adoption Will Require Hiring Skilled Security Experts, Business Professionals Say

4% of professionals currently use 5G and 80.7% plan to adopt 5G in the year ahead 30% ...

Dec 09, 2020

Stay Competitive with Minimum Cost – Upgrade Your Offer with Licensed Technology

If the countless cyber attacks from the past months have made anything clear, it’s that ...

Dec 09, 2020

How They Did It: New Infographic Dissects Complete Chinese APT Attack Cycle

New Infographic breaks down the key attack stages and specific detections revealed by ...

Dec 08, 2020

5 Signs Spoofing Still Remains One of Cybersecurity's Biggest Problems

624,000 U.S. security brokers recently targeted by FINRA spoofing attempts 50,000 fake login ...

Dec 08, 2020

IoT Security Bill Signed Into U.S. Law

Too many IoT devices ship from the manufacturer with vulnerabilities and inadequate ways to ...

Dec 07, 2020

Organizations Adopting Cloud-Native Apps Struggle with Security Issues Stemming from API Sprawl, Survey Shows

86% of respondents say their organization is actively using or has started using ...

Dec 07, 2020

What Does Self-Service Security Do for AppSec?

DevOps teams with high levels of security integration are more than twice as likely to use ...

Dec 07, 2020

Market Study: Security Concerns Up—Mitigation Efforts Down

Fewer organizations are taking steps to mitigate cyber security risks compared with a year ...

Dec 04, 2020

Cloud Security Is a Primary Concern for Most Companies and Decision Makers, Report Finds

Data loss is one of the issues most companies fear Many organizations continue to implement ...

Dec 03, 2020

FBI Warns of Hackers Abusing Email Forwarding Rules in Recent Attacks

Remote-working has seen wider use of web-based email services Hackers have compromised ...

Dec 02, 2020

Bitdefender Launches New Dedicated Endpoint Detection and Response (EDR) Product and Some Important GravityZone Enhancements

Bitdefender Endpoint Detection and Response is our new EDR product that supplements any ...

Nov 29, 2020

Most Executives Worry about Security Risks Accompanying Remote Workers, Survey Finds

IT executives fear that people working from home bring new and unknown risks Some companies ...

Nov 27, 2020

New Bitdefender EDR for MSPs, Ransomware Mitigation and additional enhancements

New lightweight Endpoint Detection and Response (EDR) product that works alongside ...

Nov 27, 2020

Business Interruption Is the Main Cost Driver of Cyber Insurance Claims, Says Allianz

External attacks cause the most costly cyber losses, but internal incidents like human error ...

Nov 26, 2020

Automation to Drive Tidal Wave of Spear Phishing Campaigns in 2021, Researchers Predict

Email remains the biggest threat to corporate infrastructures Cyber-criminals are creating ...

Nov 25, 2020

US Organizations Hit by Ransomware More than Rest of the World Combined, New Research Shows

57% of all ransomware attacks tracked by the company in 2020 took place in the US Ransom ...

Nov 25, 2020

Enterprises Skimping On Basic Cybersecurity Controls

The benefits of connected medical devices outweigh the risks. Despite remote security risks, ...

Nov 24, 2020

Business Sector Increasingly Adopting AI Cybersecurity to Tackle Advanced Threats

Report presents changing perspectives of cybersecurity globally Nearly half of organizations ...

Nov 23, 2020

Common IoT Devices Become the ISPs' Worst Enemy

IoT devices are everywhere and many users don’t even realize they own such hardware Some of ...

Nov 23, 2020

Despite Security Concerns, Connected Medical Device Use Soars

The benefits of connected medical devices outweigh the risks. While healthcare organizations ...

Nov 20, 2020

The Cost of Cybersecurity Incidents Is on the Rise, Mainly Due to Human Error or Systems Failure

The number of cyber insurance claims is on the rise since 2016 Business interruption is more ...

Nov 19, 2020

Ransomware Downtime Costs Doubled Since 2019, MSPs Report

Remote work and cloud computing contribute to increase in ransomware attacks Healthcare ...

Nov 18, 2020

The New EDR and Platform Enhancements from Bitdefender

The last major release of the year brings on November 17, 2020 a new product and important ...

Nov 18, 2020

Strained IT Teams Are Struggling to Maintain Security Standards, Research Shows

Tech leaders tend to overestimate the positive experience of remote workers Since the ...

Nov 17, 2020

Dissecting a Chinese APT Targeting Southeast Asian Government Institutions

Detailed exposé of a potential Chinese APT group targeting Southeast Asian governments  ...

Nov 16, 2020

New Study Pegs Hospitals as ‘Sitting Ducks’ for Cyberattacks

It takes 70% longer to fill cybersecurity roles in health systems than other IT jobs 75% of ...

Nov 16, 2020

Addressing the Need for Strong Data Governance

The need for strong data governance has become a focal point for many organizations in ...

Nov 13, 2020

Global Cybersecurity Workforce Expands by 25% in 2020, (ISC)² Reveals

Researchers report year-over-year reduction in the cybersecurity workforce gap The ranks of ...

Nov 12, 2020

Are IT Departments Unprepared to Defend Their Employers Against Today’s Advanced Cyber Threats?

10 months into the pandemic, secure access and endpoint security remain a top challenge for ...

Nov 11, 2020

Financial Services Industry Reports Sharp Rise in Cyberattacks

The pandemic is driving an increase in cyberattacks Weaknesses in supply chain and remote ...

Nov 10, 2020

The Pandemic Replaced Complex Corporate Security Systems with Two-Bit Routers, But ISPs Can Help

Somehow, employees now have to ensure the security of their own companies Consumer-grade ...

Nov 10, 2020

Attacks Targeting the Healthcare Industry Grow Increasingly Severe

Healthcare providers are under enormous pressure to both deliver care and defend against ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware

WATCH NOW