Homograph Phishing Attacks - When User Awareness Is Not Enough
Microsoft Office vulnerable to homograph attacks Homograph (also known as homoglyph) ...
The Origin of Ransomware - Exploring the evolution of one of cybersecurity’s most prolific threats
Ransomware – where an attacker steals or freezes an organizations’ computer systems or data ...
We Need To Stop Preparing For The Last War | ConnectWise CyberSEC 2022
It is the beginning of a new year, and the internet is full of articles reviewing the ...
The Clock is Ticking: What To Do Immediately After a Ransomware Attack
Ransomware is a fast-growing threat impacting organizations of all sizes, across all ...
Bitdefender Threat Debrief | March 2022
Highlight of the month: Ukraine Conflict In reaction to the ongoing conflict in Ukraine, ...
SMBs Need to Go on the Offensive with Cyber Security
Recently there has been a push for more proactive cyber security strategies, even to the ...
Bitdefender Threat Debrief | February 2022
Highlight of the month: New Mobile Banking Malware Campaigns Discovered When we introduced ...
What Are Ransomware Families? (And Why Knowing Them Can Help Your Business Avoid Attack)
It would be almost impossible to use a computer or network for business and be unaware of ...
What Are The Biggest Cyber Threats of The Future?
Cybersecurity was a growing concern even before the Internet became the dominant form of ...
Bitdefender Threat Debrief | January 2022
The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and ...
2022 Cybersecurity Predictions: Bitdefender Expert Picks
2021 wasn’t the best year for cybersecurity — if you pitted companies versus malicious ...
Top 2022 Cybersecurity Predictions for the Healthcare Industry
The healthcare industry has been one of the most targeted industries over the past few years ...