The Lifecycle of Stolen Data: From Theft to Profit
With the recent news of AT&T’s data breach, stolen company data is very top of mind at ...
A Comprehensive Look at the Evolution of the Cybercriminal Underground
The early days of hacker groups and lone wolf threat actors look much different compared to ...
Understanding APT40: Insights from CISA’s Latest Joint Security Advisory
The Cybersecurity and Infrastructure Security Agency (CISA) recently published a joint ...
Exploring the Essential Components of a Threat Intelligence Platform
Threat Intelligence Platforms (TIPs) are a great solution to centralize and manage multiple ...
Deep Dive Into Unfading Sea Haze: A New Threat Actor in the South China Sea
In a recent investigation by Bitdefender Labs, a series of cyberattacks targeting high-level ...
Exploring The Spectrum of Threat Intelligence Types
Security companies understand the crucial role threat intelligence (TI) can play in ...
CACTUS: Analyzing a Coordinated Ransomware Attack on Corporate Networks
Bitdefender Labs recently helped with an investigation that unfortunately aligns with two ...
2024 Cybersecurity Outlook: Navigating the Geopolitical Landscape
Welcome to our 2024 Cybersecurity Forecast Series! This is the last of our four expert blogs ...
The Anatomy of a Cyber Threat Takedown: Lessons from a Top Cybersecurity Operative
The dynamics of the cybersecurity landscape have evolved significantly over the last thirty ...
Bitdefender Threat Debrief | November 2023
Monitoring lateral movement across hybrid cloud environments, spanning platforms like Google ...
How Risk Management Can Be Backed by Threat Intelligence
In light of the rising third-party cybersecurity threats in recent years, simply defending ...
The Chain Reaction: New Methods for Extending Local Breaches in Google Workspace
Modern EDR and XDR solutions do not operate deterministically. Instead, they work in shades ...