At Bitdefender, we understand the security challenges that organizations face in this ever-accelerating, hybrid, multi-cloud world. From small to very large, companies encounter common issues. We have been collaborating with Citrix to anticipate and address your cloud workload-protection challenges.
All about Virtualization and Cloud Security | Recent Articles:
Once again, we approach the end of the year with great news. All the way from Tokyo.
Ransomware lost its spot as the number one cyberthreat to consumers and enterprises during the first half of 2018, after topping the list for years. Despite being somewhat outpaced by cryptojackers, though, ransomware has made a rapid recovery, showing that file-encrypting malware is here to stay. And all signs point to a 2019 riddled with emerging new threats.
The advanced attack targeting Pakistan described by Cylance mentions an evasion technique that incapacitates the security solutions provided by 8 vendors. Bitdefender products have been successfully blocking this threat since 2016. We conducted our own analysis of this malware and we have new findings to share.
“Survival” is usually associated with stoically pushing on through harsh conditions, symbolized by people like this year’s Nutanix .NEXT keynote speakers -- Bear Grylls and Jane Goodall. But, as technology weaves ever more tightly into our daily lives to support mobility and improve life quality, the term “survival” is also starting to denote the ability to withstand a cyberattack. Bruce Schneider nails it in his security talks – if in the past, a cyberattack could crash your spreadsheet, today, it could crash your car.
The pace of innovation in emerging Cloud technologies is making it more and more challenging for IT practitioners to keep up. It’s time to get ahead! .NEXT On Tour is specifically designed to provide you with insights on the latest in emerging Hybrid-Cloud technologies and how real-world customers are transforming their organizations.
Bitdefender has recently investigated a series of advanced cyberattacks aimed at financial institutions, designed to covertly exfiltrate massive amounts of money in coordinated strikes.
Every year, world’s best security blogs get to compete in the European Security Bloggers Awards, an event part of London’s Infosec Europe. This year, we are honored to be among the finalists in two categories, namely The Best Corporate Security Blog and The Best European Corporate Security Blog.
Update November 2019: One of the most notable cryptojacking attacks of 2019 was based on Microsoft's BlueKeep vulnerability, which was used to deliver cryptomining software to legacy Windows systems starting summer 2019.
This proves that cryptomining is still a preferred payload for attackers who receive immediate financial rewards from each victim they infect without their knowledge.
Like most groundbreaking inventions, cryptocurrencies bring a moral paradox: while some people consider them a revolutionary tool to make the world a better place, others already use it to fuel their illegal activities. Therefore, it was just a matter of time before this energy-hungry activity became a serious cybersecurity issue.
Dear reader: if we had the chance, we would definitely name you the Best Corporate Security Blog Reader out there.
Ransomware, malware, and other elusive attacks threaten companies of all sizes every year, and the attacks are becoming more aggressive and more frequent.
Every company's executive team should be aware of how to prevent these attacks from happening by making security be a "whole company" initiative instead of just an "IT problem".