Introducing Proactive Hardening and Attack Surface Reduction (PHASR)
Attackers frequently gain initial access through compromised credentials or unmanaged ...
Bitdefender + Microsoft Virtual Network TAP: Deepening Visibility, Strengthening Security
In today’s rapidly evolving threat landscape, visibility is everything. The ability to ...
PHASR Launch: Major Bitdefender News at RSAC 2025
If you’re the kind of cybersecurity professional who is looking for a first-of-its-kind ...
GravityZone PHASR: Redefining Endpoint Security with Tailored Hardening for Every User
Cyberattacks have shifted away from using custom malware. Today, attackers use stolen ...
7 Types of Business Email Compromise Attacks Targeting Your Organization
Impersonation fraud attempts have been around for millennia. Think of a long-lost “cousin” ...
The Hidden Risks of Over-Relying on AI in Cybersecurity
Artificial intelligence (AI) and automation are game-changers in cybersecurity. AI-powered ...
Cybertrends to Track: Weaponizing People and Tools
Is it possible the next wave of cyber fraud targeting your organization could come from ...
Building a Threat Intelligence Team: Roles, Tools, and Strategic Value
Cybersecurity has traditionally been reactive. Detect a threat inside the network? Deploy an ...
How to Use NIST CSF 2.0 to Identify Security Gaps: Part 3
For those just tuning in, this five-part series is all about how to use a cybersecurity ...
Cybersecurity Predictions 2025: Hype vs. Reality
Cybersecurity predictions are abundant this time each year, many filled with sensationalism ...
Cloud Native Security: Balancing Consolidation and Flexibility
As organizations of all sizes continue to adopt cloud technologies, the importance of Cloud ...
Introducing YARA Rules to Enhance Threat-Hunting Capabilities
On the 27th of November Bitdefender announced General Availability (GA) for YARA rules ...