The Criticality of Understanding Your Holistic Cyber Security Posture
Given today’s cyber threat landscape, organizations are under constant pressure to assess ...
What’s New in GravityZone Platform August 2024 (v 6.53)
On the 5th of August, Bitdefender rolled out new functionality in Bitdefender GravityZone, a ...
A Comprehensive Look at the Evolution of the Cybercriminal Underground
The early days of hacker groups and lone wolf threat actors look much different compared to ...
Beyond Technical Offensive Security: 4 Tips for Implementing a Holistic Approach to Managing Cyber Risk
Cybersecurity assessments are an integral part of an organization’s security strategy, ...
IoT Security: A Call to Action for Improved Vulnerability Disclosure
The explosion of Internet of Things (IoT) devices over the last decade has connected us in ...
Rafel RAT: A Pest Invading Droid Systems
Mobile security is facing a major challenge in the form of Android malware. Picture a ...
Why Every Organization Should Implement Extended Detection and Response (XDR)
Extended Detection and Response (XDR) solutions have radically changed the cybersecurity ...
Our Software Release Strategy
Following recent cybersecurity events, we’ve seen a significant increase in inquiries from ...
Understanding APT40: Insights from CISA’s Latest Joint Security Advisory
The Cybersecurity and Infrastructure Security Agency (CISA) recently published a joint ...
Bitdefender Threat Debrief | July 2024
Staying ahead of ransomware attackers, let alone any threat actor, is a constant battle for ...
Breaking Down the Intersection of AI and Cybersecurity
In the world of cybersecurity, staying ahead of emerging threats is paramount. Florin ...
Introducing External Attack Surface Management (EASM): Continuous Visibility for Your External Assets
You might have unknown assets like remote users' computers, business partners, and cloud ...