New U.S. Government Website Provides Ransomware Resources for Organizations
The potential dangers of ransomware are top of mind for cyber security and IT leaders around ...
Why is Content Moderation for Email Security Solutions So Important?
As organizations expand their operations to multiple platforms, they must also manage the ...
Deep Dive Into A FIN8 Attack – A forensic investigation
During a recent investigation, our researchers encountered a new version of the BADHATCH ...
Enhancing APT Detection Capabilities Through Threat Intelligence
Advanced Persistent Threats (APTs) continue to produce challenges for security teams. The ...
The Growing Importance of Cloud Workload Security
A growing number of organizations are increasing their use of the cloud. These workloads, ...
Technical Advisory: SeriousSAM – Windows 10 Flaw Can Be Used by Malicious Actors to Obtain Administrator Rights
Newer versions of Windows 10 (build 1809 - 2018-present) may be vulnerable to a local ...
Effective Healthcare Security Is Much More Than Compliance
When it comes to managing the security of their data and business-technology systems, many ...
Join Bitdefender at Black Hat 2021!
Come August, the Bitdefender team – along with some 20K security and InfoSec professionals – ...
Seven Steps Healthcare Providers Can Take Now to Shrink Their Security Skills Gap
Healthcare providers are operating in a time of extraordinary pressure. Whether it's ...
Want to get started with XDR? XEDR may be the best place to begin
Every three to five years a new cybersecurity technology term gets hyped. In 2021 it’s ...
Security Architecture Considerations for Cyber Resilience - Threat Prevention
In an earlier blog this year, I compared the concepts of cybersecurity and cyber-resiliency, ...
Advisory on Kaseya VSA Ransomware Attack
Update: July 13, 2021 -- Kaseya issued a critical security update for VSA users that is ...