Meow, Meow Leaks, and the Chaos of Ransomware Attribution

Meow has captivated the attention of cybersecurity and threat intelligence teams as a threat ...

Medusa Ransomware: A Growing Threat with a Bold Online Presence

Medusa is a prominent ransomware group that emerged in 2023. Unlike most ransomware ...

The Lifecycle of Stolen Data: From Theft to Profit

With the recent news of AT&T’s data breach, stolen company data is very top of mind at ...

A Comprehensive Look at the Evolution of the Cybercriminal Underground

The early days of hacker groups and lone wolf threat actors look much different compared to ...

Understanding APT40: Insights from CISA’s Latest Joint Security Advisory

The Cybersecurity and Infrastructure Security Agency (CISA) recently published a joint ...

Exploring the Essential Components of a Threat Intelligence Platform

Threat Intelligence Platforms (TIPs) are a great solution to centralize and manage multiple ...

Deep Dive Into Unfading Sea Haze: A New Threat Actor in the South China Sea

In a recent investigation by Bitdefender Labs, a series of cyberattacks targeting high-level ...

Exploring The Spectrum of Threat Intelligence Types

Security companies understand the crucial role threat intelligence (TI) can play in ...

CACTUS: Analyzing a Coordinated Ransomware Attack on Corporate Networks

Bitdefender Labs recently helped with an investigation that unfortunately aligns with two ...

2024 Cybersecurity Outlook: Navigating the Geopolitical Landscape

Welcome to our 2024 Cybersecurity Forecast Series! This is the last of our four expert blogs ...

The Anatomy of a Cyber Threat Takedown: Lessons from a Top Cybersecurity Operative

The dynamics of the cybersecurity landscape have evolved significantly over the last thirty ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW