Tech Explainer | What is DLL Sideloading?
Welcome to the Bitdefender tech explainer about DLL sideloading attacks! In this article, we ...
Meet Bitdefender at GITEX GLOBAL 2022
As THE undisputed tech event for more than 40 years, GITEX GLOBAL, taking place October 10 – ...
Cyber Risk Mitigation in the Era of Quantum Computing
Quantum computing, once widely-viewed as little more than steampunk-inspired sci-fi fantasy, ...
The AI Cyber Threat of Google LaMDA
Artificial intelligence (AI), a phrase that has been in use since the 1950s, is defined as ...
Bitdefender Threat Debrief | July 2022
Managed Detection and Response (MDR) Insights Let's talk about credential leaks. Whether ...
Why SMBs Need To Consider Cyber Insurance
The cybersecurity threat environment is increasingly dangerous. Ransomware attacks are on ...
A Tale of Two Threat Intelligence Solutions – Open Source (OSINT) & Commercial
The threat landscape is constantly changing. A few months into the pandemic, as most human ...
Exploring the Latest in Cybersecurity Technologies at the 2022 RSA Conference
Bitdefender recently joined more than 26,000 attendees, 600 speakers and 400 exhibitors at ...
How to Choose a Threat Intelligence Provider
Today’s cyber threats are causing more damage than ever. Cyberattacks inflicted the highest ...
Deep Dive into the Elephant Framework – A New Cyber Threat in Ukraine
At the beginning of the invasion of Ukraine, we released a security advisory with ...
Native XDR vs Open XDR
As organizations continue to grow and invest in multiple third-parties, increase their ...
CISOs at SMBs Need to Prepare for Zero-Day Vulnerabilities
Zero-day vulnerabilities are among the most worrisome cyber security risks for ...