The AI Cyber Threat of Google LaMDA

Artificial intelligence (AI), a phrase that has been in use since the 1950s, is defined as ...

Bitdefender Threat Debrief | July 2022

Managed Detection and Response (MDR) Insights Let's talk about credential leaks. Whether ...

Join Bitdefender at Black Hat 2022

Black Hat is an internationally recognized cybersecurity conference known for providing ...

Why SMBs Need To Consider Cyber Insurance

The cybersecurity threat environment is increasingly dangerous. Ransomware attacks are on ...

A Tale of Two Threat Intelligence Solutions – Open Source (OSINT) & Commercial

The threat landscape is constantly changing. A few months into the pandemic, as most human ...

Exploring the Latest in Cybersecurity Technologies at the 2022 RSA Conference

Bitdefender recently joined more than 26,000 attendees, 600 speakers and 400 exhibitors at ...

How to Choose a Threat Intelligence Provider

Today’s cyber threats are causing more damage than ever. Cyberattacks inflicted the highest ...

Deep Dive into the Elephant Framework – A New Cyber Threat in Ukraine

At the beginning of the invasion of Ukraine, we released a security advisory with ...

Native XDR vs Open XDR

As organizations continue to grow and invest in multiple third-parties, increase their ...

CISOs at SMBs Need to Prepare for Zero-Day Vulnerabilities

Zero-day vulnerabilities are among the most worrisome cyber security risks for ...

The Clock is Ticking: What to do immediately after a ransomware attack

Ransomware is a fast-growing threat impacting organizations of all sizes, across all ...

Why Cloud Workload Security (CWS) Should Be Your 2022 Priority

The cloud is quickly becoming the most important battleground for organizations. ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware

WATCH NOW