Subscribe to Email Updates


Author: Ashish Chakrabortty

Ashish is a Technical Marketing Engineer with Bitdefender. He has a Masters degree in Electrical Engineering from San Jose State University. Ashish enjoys spending his time reading up on threat reports, simulating exploits and producing high-visibility content.

All about Virtualization and Cloud Security | Recent Articles:

Technical Advisory: Zero-day vulnerability in Microsoft MSHTML allows remote code execution

Quick overview

Microsoft recently issued a warning for CVE-2021-40444, a zero-day remote code execution (RCE) vulnerability in MSHTML (Microsoft HTML) which is currently exploiting multiple versions of Windows and Office.

Read More

Linux and Container Security: Removing module dependencies

Bitdefender recently announced GravityZone Security for Containers, expanding our cloud workload security (CWS) by offering run-time support for containers and infrastructures with Linux kernel module (LKM) independence for the Bitdefender technology.

Read More

Bitdefender Endpoint Detection and Response, The Vaccine You Need for Advanced Threats

  • Advanced targeted threats are designed with a defined purpose to infect and remain undetected in a network over a prolonged period
  • Endpoint Protection has fundamental limitations as advanced threats easily circumvent traditional defenses by using varied tactics, techniques and procedures (TTPs)
  • Bitdefender Endpoint Detection and Response (EDR) provides superior performance, security analytics and incident management capabilities to enjoy a privileged spot amongst competition
Read More

Zerologon: How Bitdefender Protects Customers from this No-Credential Post-Exploit Technique

  • Zerologon is a zero-credential vulnerability that exploits Windows Netlogon to allow adversaries access to the Active Directory domain controllers, first reported in August 2020 
  • “This attack has a huge impact” according to researchers, as attackers on the local network can launch this exploit to compromise the Windows domain controller with no authentication
  •  Bitdefender customers are protected from this post-exploit technique via our Network Attack Defense, Anti-Malware SDK and Indicator of Risk (IOR) technologies
Read More

Cloud Security

Subscribe to Blog Updates

Latest Tweets

Posts by Month