Upgrading Cryptography to a Post-Quantum Secure State
Cybersecurity and privacy is a lofty task when taking into consideration the attack surface ...
How Quantum Computing Will Change Encryption Forever
The interaction between companies and threats have always been cyclical. Threats and ...
No More Ransom – Six Years of Innovating to Fight Ransomware Together
When talking about cybercrime, you can’t avoid the topic of ransomware. It is one of the few ...
Homograph Phishing Attacks - When User Awareness Is Not Enough
Microsoft Office vulnerable to homograph attacks Homograph (also known as homoglyph) ...
The Origin of Ransomware - Exploring the evolution of one of cybersecurity’s most prolific threats
Ransomware – where an attacker steals or freezes an organizations’ computer systems or data ...
We Need To Stop Preparing For The Last War | ConnectWise CyberSEC 2022
It is the beginning of a new year, and the internet is full of articles reviewing the ...
The Clock is Ticking: What To Do Immediately After a Ransomware Attack
Ransomware is a fast-growing threat impacting organizations of all sizes, across all ...
Bitdefender Threat Debrief | March 2022
Highlight of the month: Ukraine Conflict In reaction to the ongoing conflict in Ukraine, ...
SMBs Need to Go on the Offensive with Cyber Security
Recently there has been a push for more proactive cyber security strategies, even to the ...
Bitdefender Threat Debrief | February 2022
Highlight of the month: New Mobile Banking Malware Campaigns Discovered When we introduced ...
What Are Ransomware Families? (And Why Knowing Them Can Help Your Business Avoid Attack)
It would be almost impossible to use a computer or network for business and be unaware of ...
What Are The Biggest Cyber Threats of The Future?
Cybersecurity was a growing concern even before the Internet became the dominant form of ...