Bitdefender Threat Debrief | May 2025

From Locked In to Compromised: LockBit Exposure Fuels Hunt for Threat Intelligence In this ...

May 08, 2025

How to Use NIST CSF 2.0 to Identify Security Gaps: Part 4

Welcome back to this five-part series on using a cybersecurity framework (NIST CSF 2.0) to ...

What’s New in GravityZone April 2025 (v 6.61)

Bitdefender recently rolled out new functionality in Bitdefender GravityZone, a ...

Bitdefender Achieves AV-Comparatives Anti-Tampering Certification

Bitdefender is one of just six vendors to pass the AV-Comparatives Anti-Tampering ...

Inside the Ransomware Supply Chain: The Role of Initial Access Brokers in Modern Attacks

Ransomware threat actors depend on numerous cybercriminal skillsets to breach, disrupt, and ...

Bitdefender + Microsoft Virtual Network TAP: Deepening Visibility, Strengthening Security

In today’s rapidly evolving threat landscape, visibility is everything. The ability to ...

PHASR Launch: Major Bitdefender News at RSAC 2025

If you’re the kind of cybersecurity professional who is looking for a first-of-its-kind ...

GravityZone PHASR: Redefining Endpoint Security with Tailored Hardening for Every User

Cyberattacks have shifted away from using custom malware. Today, attackers use stolen ...

7 Types of Business Email Compromise Attacks Targeting Your Organization

Impersonation fraud attempts have been around for millennia. Think of a long-lost “cousin” ...

The Hidden Risks of Over-Relying on AI in Cybersecurity

Artificial intelligence (AI) and automation are game-changers in cybersecurity. AI-powered ...

Bitdefender Threat Debrief | April 2025

In this month’s Threat Debrief: A rebrand of a rebrand as the Hunters International ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW