Bitdefender Threat Debrief | April 2025

In this month’s Threat Debrief: A rebrand of a rebrand as the Hunters International ...

Mar 12, 2025

The Anatomy of a Partnership: Bitdefender Together with Scuderia Ferrari HP in 2025

Trust is invisible. It is the foundation of every decision, every strategy, and every ...

Building a Threat Intelligence Team: Roles, Tools, and Strategic Value

Cybersecurity has traditionally been reactive. Detect a threat inside the network? Deploy an ...

ShrinkLocker (+Decryptor): From Friend to Foe, and Back Again

Imagine a ransomware attack that's so old-school it's using VBScript and a built-in Windows ...

Meow, Meow Leaks, and the Chaos of Ransomware Attribution

Meow has captivated the attention of cybersecurity and threat intelligence teams as a threat ...

Medusa Ransomware: A Growing Threat with a Bold Online Presence

Medusa is a prominent ransomware group that emerged in 2023. Unlike most ransomware ...

The Lifecycle of Stolen Data: From Theft to Profit

With the recent news of AT&T’s data breach, stolen company data is very top of mind at ...

A Comprehensive Look at the Evolution of the Cybercriminal Underground

The early days of hacker groups and lone wolf threat actors look much different compared to ...

Understanding APT40: Insights from CISA’s Latest Joint Security Advisory

The Cybersecurity and Infrastructure Security Agency (CISA) recently published a joint ...

Exploring the Essential Components of a Threat Intelligence Platform

Threat Intelligence Platforms (TIPs) are a great solution to centralize and manage multiple ...

Deep Dive Into Unfading Sea Haze: A New Threat Actor in the South China Sea

In a recent investigation by Bitdefender Labs, a series of cyberattacks targeting high-level ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW