Subscribe to Email Updates


All about Virtualization and Cloud Security | Recent Articles:

When it Comes to Application Security, Banks Pay Little Interest

Aug 16 by George V. Hulme

One might think financial institutions, such as banks, would have formidable levels of application security. Unfortunately, if one thought that, one would be wrong. According to an analysis by application security vendor ImmuniWeb, a startling 97 out of 100 of the world’s largest banks are vulnerable to web and mobile attacks.

Read More

How to Manage the Headache of Defending Industrial IT Infrastructures (Industrial IoT) – Part 2

Aug 14 by Bogdan Carlescu

This is the second of a two-part series of blog posts covering the challenges of securing Industrial IT infrastructures. This part covers:

Read More

Best Practices for Cloud Workload Protection – Redesigning Cybersecurity for Cloud-First Businesses

Aug 13 by Filip Truta

Legacy security designed to protect physical endpoints is no match for software-defined environments, such as cloud infrastructures. In fact, not even a modern endpoint security solution can, on its own, cover the full spectrum of cloud-workload protection requirements, use cases and workload types. This has opened the flood-gates to a new breed of cybersecurity solutions called “Cloud Workload Protection Platforms” (CWPPs), and the market is ripe for the picking, according to Gartner.

Read More

UK Fines Jump Since GDPR Implementation

Aug 12 by George V. Hulme

Commercial law firm Reynolds Porter Chamberlain LLP says that the average fine levied by the Information Commissioner’s Office rose 14% in the year since the introduction of GDPR, increasing from £125,000 in 2017/18 to £143,000 in 2018/19.

Read More

Grappling with the Security Talent Shortage? Maybe Automation Can Help

Aug 09 by Bob Violino

It’s an issue that gnaws at many cyber security executives perhaps as much as the latest insidious threats: the ongoing security skills shortage. And recent research suggest that the prospects will not get better any time soon.

Read More

15 Hot Tools To Come Out of Black Hat and Def Con

Aug 07 by Ericka Chickowski

Security summer camp is upon us as the cybersecurity industry convenes on Las Vegas this week for Black Hat and Def Con. In addition to presenting a ton of important research on new vulnerabilities and exploit methods, many security researchers will be sharing with attendees a smorgasbord of new and updated open source tools. Between speaker tracks at both shows, Black Hat Arsenal, and DEF CON Demo Days, presenters will unveil and demo dozens of freebies designed to help their colleagues with a range of offensive and defensive security activities.

Read More

Protecting Against SWAPGS Attack with Bitdefender Hypervisor Introspection

Aug 06 by Andrei Florescu
  • Speculative execution-based attacks exploit CPU architecture flaws to allow attackers to leak sensitive information from privileged operating system kernel memory
  • The SWAPGS Attack leverages a new speculative execution vulnerability discovered by Bitdefender security researchers
  • The SWAGS Attack circumvents all existing side-channel attack mitigations and allows attackers to gain unprivileged access to kernel sensitive data
  • Bitdefender Hypervisor Introspection technology mitigates the SWAPGS Attack on unpatched Windows systems running on Citrix Hypervisor or KVM hypervisor

Today, multiple industry software and hardware vendors have published security advisories for CVE-2019-1125 related to a newly discovered side-channel attack, dubbed SWAPGS Attack. The SWAPGS Attack was identified and reported by Bitdefender security researchers working on hypervisor introspection and anti-exploit technologies. This led to a coordinated disclosure process that has included several strategic industry partners.

Read More

How to manage the headache of defending Industrial IT Infrastructures (Industrial IoT) – Part 1

Aug 06 by Bogdan Carlescu

This is the first of a two-part series of blog posts covering the challenges of securing Industrial IT infrastructures. This part covers:

Read More

New Cyber Security Alliance Aims to Fight Back

Aug 05 by Bob Violino

There’s clearly a sense of combativeness building on the part of cyber security leaders, teams, and organizations worldwide. Weary of seeing cyber criminals and other bad actors break into networks and systems seemingly at will to steal sensitive data, they are taking steps to bolster the overall effectiveness of security programs.

Read More

Join Bitdefender at Black Hat 2019 for a Legendary Experience


*Update* 4PM PDT on 8/06/2018 - Bitdefender senior researchers Dan Horea Luțaș and Andrei Vlad Luțaș recently uncovered a new speculative-execution vulnerability and demonstrated how it can be exploited via a side-channel style attack, dubbed SWAPGS Attack. The vulnerability has been publicly reported today as CVE-2019-1125. Be sure to join us on August 7th at 10:20 AM in Ballroom K to learn more about the SWAPGS attack.


In August, all roads lead to Las Vegas – that is if you want to meet the best security professionals, penetration testers and malware investigators in the world. Over the past 22 years, Black Hat has become the leading information security event in the world.

Read More

Fraudsters Are Trying to Steal $8.7 Million Every Single Day through Business Email Compromise

Aug 01 by Graham Cluley

The Financial Crimes Enforcement Network (FinCEN), part of the US Department of the Treasury, has released an alert to financial institutions that fraudsters are attempting to steal much more money through Business Email Compromise than previously believed.

Read More

New York Businesses Must Now Report a Breach Even if Private Data Was Merely ‘Viewed’

Jul 31 by Filip Truta

New York is joining other US states in expanding its definition of a data breach to include unauthorized “viewing” of data. The amendment also expands the definition of private information.

Read More

Cloud Security

Subscribe to Blog Updates

Latest Tweets