ShrinkLocker (+Decryptor): From Friend to Foe, and Back Again

Imagine a ransomware attack that's so old-school it's using VBScript and a built-in Windows ...

Critical Edge Network Devices: Patching Vulnerabilities to Block Ransomware

Imagine an ordinary weekday morning at a mid-sized company: emails are flowing, employees ...

Ransomware Defense: Where Decryptors Fit into the Bigger Picture

The prevalence of ransomware-as-a-service (RaaS) and increased activity from cybercriminal ...

Bitdefender Threat Debrief | October 2024

Ransomware making headlines may seem like the norm these days, but for businesses and ...

Maximizing IT Budgets to Close Security Gaps Against Ransomware

Ransomware has transformed from an isolated IT headache into one of the most pervasive and ...

Meow, Meow Leaks, and the Chaos of Ransomware Attribution

Meow has captivated the attention of cybersecurity and threat intelligence teams as a threat ...

Bitdefender Threat Debrief | September 2024

Ransomware threats continue to challenge security professionals, requiring constant ...

Medusa Ransomware: A Growing Threat with a Bold Online Presence

Medusa is a prominent ransomware group that emerged in 2023. Unlike most ransomware ...

Top Ransomware Trends for 2024-2025 Security Teams Can't Ignore

As ransomware tactics evolve, staying ahead of emerging threats has never been more crucial ...

Bitdefender Threat Debrief | August 2024

Staying ahead of ransomware attackers is a constant battle for security specialists. By ...

A Comprehensive Look at the Evolution of the Cybercriminal Underground

The early days of hacker groups and lone wolf threat actors look much different compared to ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW