The Korean Leaks – Analyzing the Hybrid Geopolitical Campaign Targeting South Korean Financial Services With Qilin RaaS
TL;DR The "Korean Leaks" campaign showcases a sophisticated supply chain attack against ...
Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines
I'd like to thank my coauthors Adrian Schipor and Martin Zugec for their invaluable ...
EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company
I'd like to thank my coauthors, Victor Vrabie, Adrian Schipor, and Martin Zugec, for their ...
UAC-0063: Cyber Espionage Operation Expanding from Central Asia
Bitdefender Labs warns of an active cyber-espionage campaign targeting organizations in ...
ARM Support on Windows for Bitdefender Solutions
Windows on ARM (WoA) goes back a long way, it is a growing hardware and application ...
GravityZone Excels in AV-Comparatives Business Security Test
Bitdefender Awarded Approved Business Product AV-Comparatives has given their “Approved ...
Deep Dive Into a BackdoorDiplomacy Attack – A Study of an Attacker’s Toolkit
A China-linked cyber espionage operation targeting multiple telecom providers in the Middle ...
Bitdefender Again Leads the AV-Comparatives Advanced Threat Protection Tests
In November of 2022, AV-Comparatives concluded their 2022 Advanced Threat Protection Test ...
Effective Fraud Detection and Prevention with Threat Intelligence
Organizations have moved a considerable part of operations online to ease the purchase ...
How to Choose a Threat Intelligence Provider
Today’s cyber threats are causing more damage than ever. Cyberattacks inflicted the highest ...
EDR & XDR – Security Solutions for Hybrid & Remote SMB Ecosystems
Organizations, including small and midsized businesses (SMBs), should be on the lookout for ...
How XDR can help protect against sophisticated threat actors
It’s not easy being a business these days. Organizations are under siege against automated ...


