Technical Advisory: Critical Remote Code Execution Vulnerability in Microsoft SharePoint Server (CVE-2025-53770)
Bitdefender analysis confirmedactive, widespread exploitation of a critical remote code ...
Bitdefender Threat Debrief | July 2025
Global Hits the Ground Running with RaaS Release
Bitdefender Threat Debrief | June 2025
SafePay Ransomware Surpasses Qilin and Play, Claiming the Greatest Number of Victims in May ...
Inside the Ransomware Supply Chain: The Role of Initial Access Brokers in Modern Attacks
Ransomware threat actors depend on numerous cybercriminal skillsets to breach, disrupt, and ...
Bitdefender Threat Debrief | April 2025
In this month’s Threat Debrief: A rebrand of a rebrand as the Hunters International ...
The Anatomy of a Partnership: Bitdefender Together with Scuderia Ferrari HP in 2025
Trust is invisible. It is the foundation of every decision, every strategy, and every ...
Building a Threat Intelligence Team: Roles, Tools, and Strategic Value
Cybersecurity has traditionally been reactive. Detect a threat inside the network? Deploy an ...
ShrinkLocker (+Decryptor): From Friend to Foe, and Back Again
Imagine a ransomware attack that's so old-school it's using VBScript and a built-in Windows ...
Meow, Meow Leaks, and the Chaos of Ransomware Attribution
Meow has captivated the attention of cybersecurity and threat intelligence teams as a threat ...
Understanding the Roles in the Ransomware-as-a-Service Ecosystem: Who’s Targeting Your Data Security Gaps
Ransomware-as-a-service (RaaS) has surged in recent years, becoming a dominant model for ...
Medusa Ransomware: A Growing Threat with a Bold Online Presence
Medusa is a prominent ransomware group that emerged in 2023. Unlike most ransomware ...
The Lifecycle of Stolen Data: From Theft to Profit
With the recent news of AT&T’s data breach, stolen company data is very top of mind at ...