Subscribe to Email Updates


All about Virtualization and Cloud Security | Recent Articles:

2021 Gartner® Market Guide for Cloud Workload Protection Platforms | Bitdefender’s key takeaways from the report

Protection requirements for cloud workloads continue to grow as organizations accelerate their adoption of containers and host an ever-increasing number of workloads in hybrid and multi-cloud architectures. Cloud Workload Protection Platforms (CWPP) are critical to protect these workloads from cyberattack and provide security teams with visibility into, and control of, cloud-based infrastructure and applications.

Read More

New U.S. Government Website Provides Ransomware Resources for Organizations

Aug 03 by Bob Violino

The potential dangers of ransomware are top of mind for cyber security and IT leaders around the world. The threat of these attacks continues to rise with no organization completely safe. Ransomware attacks have been reported by businesses of all sizes and vertical industries.

Read More

Why is Content Moderation for Email Security Solutions So Important?

Jul 27 by Shanice Jones

As organizations expand their operations to multiple platforms, they must also manage the content disseminated there. This raises questions of how to protect audiences from illicit content, particularly when it comes to email security. One of the best ways to deal with these attacks is to integrate deep learning technology that can identify complex and subtle malicious files in emails.

Read More

Deep dive into a FIN8 attack – A forensic investigation

Jul 27 by Martin Zugec

During a recent investigation, our researchers encountered a new version of the BADHATCH malware used by the well-known threat actor, FIN8. We previously reported that FIN8 was working on a new version of the BADHATCH malware - and this recent attack supports our findings and conclusions. FIN8 is known for taking extended breaks to improve their tactics, techniques, and procedures (TTPs) which increases their success rate. With each new version of their toolkit, they start with small tests on a limited pool of victims before launching a full-scale attack.

Read More

Enhancing APT detection capabilities through Threat Intelligence

Advanced Persistent Threats (APTs) continue to produce challenges for security teams. The ability to track and mitigate threats, such as StrongPity APT, Lazarus and the elusive Nebulae backdoor , is critical to being resilient against APTs. One of the best ways that security teams can both detect and respond to advanced threats is by using the MITRE framework. Unfortunately, these resources are not always available to security operation centers (SOCs), managed security services providers (MSSPs) or in-house security teams due to budget constraints and available high-level talent.

Read More

The Growing Importance of Cloud Workload Security

Jul 22 by Bob Violino
  • A growing number of organizations are increasing their use of the cloud.

  • These workloads, including databases, transactions, and analytics, are vital to business operations.

  • Cloud workloads are different from regular endpoints which is why security teams need to deploy platforms specifically designed to protect these resources.

Read More

Technical Advisory: SeriousSAM – Windows 10 Flaw Can Be Used by Malicious Actors to Obtain Administrator Rights

Jul 21 by Martin Zugec

Newer versions of Windows 10 (build 1809 - 2018-present) may be vulnerable to a local privilege escalation enabled by misconfiguration on the Security Account Manager (SAM) database file. SAM is a database file that stores password hashes for all local user accounts. (This file can be found in folder %SystemRoot%\System32\Config\SAM and it is mounted in registry under HLKM\SAM.)

Read More

Effective Healthcare Security Is Much More Than Compliance

Jul 21 by George V. Hulme

When it comes to managing the security of their data and business-technology systems, many healthcare enterprises focus heavily on regulatory compliance efforts, such as their HIPAA security and patient privacy mandates. This is for an excellent reason — noncompliance can lead to costly fines and the ire of regulators. While it’s likely that focusing on regulatory compliance can incrementally improve security, that shift alone won’t take the organization to the level of security maturity it needs to have to protect against today’s threats such as ransomwar.

Read More

Join Bitdefender at Black Hat 2021!

Come August, the Bitdefender team – along with some 20K security and InfoSec professionals – will descend on Las Vegas for four days of revelry on and about the latest security risks, research, and trends.

Read More

Seven Steps Healthcare Providers Can Take Now to Shrink Their Security Skills Gap

Jul 09 by George V. Hulme

Healthcare providers are operating in a time of extraordinary pressure. Whether it's recovering their operations from a devastating pandemic year or it's the pace that their organization is embracing a rapid digital transformation aimed to optimize and modernize their systems. The last thing healthcare organizations needed this past year was an increase in ransomware and other types of attacks — but that's precisely what they experienced.

Read More

Want to get started with XDR? XEDR may be the best place to begin

Jul 09 by Bogdan Carlescu

Every three to five years a new cybersecurity technology term gets hyped. In 2021 it’s eXtended Detection and Response (XDR). I’m old enough to remember way back in 2017 when endpoint detection and response (EDR) was considered the ‘Holy Grail’ of cyber defense.

Read More

Security Architecture considerations for Cyber Resilience - Threat Prevention

Jul 05 by Bogdan Carlescu

In an earlier blog this year, I compared the concepts of cybersecurity and cyber-resiliency, arguing that the main difference between the two is one of perspective. Cybersecurity is centered on the idea that attacks can (and should) be prevented while cyber-resilience acknowledges that some attacks will go through, and that organizations must prepare to deal with the consequences quickly and effectively.

Read More

Cloud Security

Subscribe to Blog Updates

Latest Tweets

Posts by Month