Bitdefender Threat Debrief | June 2025

SafePay Ransomware Surpasses Qilin and Play, Claiming the Greatest Number of Victims in May ...

Inside the Ransomware Supply Chain: The Role of Initial Access Brokers in Modern Attacks

Ransomware threat actors depend on numerous cybercriminal skillsets to breach, disrupt, and ...

Bitdefender Threat Debrief | April 2025

In this month’s Threat Debrief: A rebrand of a rebrand as the Hunters International ...

Mar 12, 2025

The Anatomy of a Partnership: Bitdefender Together with Scuderia Ferrari HP in 2025

Trust is invisible. It is the foundation of every decision, every strategy, and every ...

Building a Threat Intelligence Team: Roles, Tools, and Strategic Value

Cybersecurity has traditionally been reactive. Detect a threat inside the network? Deploy an ...

ShrinkLocker (+Decryptor): From Friend to Foe, and Back Again

Imagine a ransomware attack that's so old-school it's using VBScript and a built-in Windows ...

Meow, Meow Leaks, and the Chaos of Ransomware Attribution

Meow has captivated the attention of cybersecurity and threat intelligence teams as a threat ...

Medusa Ransomware: A Growing Threat with a Bold Online Presence

Medusa is a prominent ransomware group that emerged in 2023. Unlike most ransomware ...

The Lifecycle of Stolen Data: From Theft to Profit

With the recent news of AT&T’s data breach, stolen company data is very top of mind at ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW