Technical Advisory: Software Supply Chain Attack Against 3CX Desktop App

On March 29, 2023, security researchers documented a malicious campaign targeting 3CX ...

Top 10 Security Risks: Vulnerabilities, Misconfigurations, and User Behavior to Avoid

Today, cybercriminals are more sophisticated than ever and tend to exploit the weakest point ...

Bitdefender Threat Debrief | March 2023

MDR Insights When reviewing ransomware data from this month, it did not come as a big ...

From Struggle to Success: Client Experiences in Closing the Cybersecurity Skills Gap

Organizations of all sizes and industries are navigating a very challenging threat ...

Bits and Bytes: Unpacking XDR With a Forrester Guest Analyst

Bits and Bytes is a webinar series on the latest security concepts. In this latest ...

What Is Dynamic Malware Analysis?

Malware is an ongoing threat that is easy for sophisticated threat actors to execute. ...

How the EPP, EDR, and MDR Landscape Is Changing

Endpoint protection platforms (EPP) and more comprehensive versions like endpoint detection ...

3 Key Takeaways From the US National Cybersecurity Strategy

Earlier in March, the White House published a paper laying out the new cybersecurity ...

Celebrating Women in Cybersecurity | International Women’s Day 2023

International Women’s Day is observed each year around the globe as a day to celebrate ...

Targeted Threat Intelligence for Security Operations

Organizations know that they can no longer settle for the anti-virus programs, intrusion ...

What Is NIS2? (And Other Frequently Asked Questions)

GDPR to NIS2 GDPR was arguably the most impactful regulatory standard and it changed the way ...

Bitdefender Threat Debrief | February 2023

MDR Insights - Patch all the things! Ask any security professional what their advice is to ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW