A Comprehensive Look at the Evolution of the Cybercriminal Underground
The early days of hacker groups and lone wolf threat actors look much different compared to ...
Understanding APT40: Insights from CISA’s Latest Joint Security Advisory
The Cybersecurity and Infrastructure Security Agency (CISA) recently published a joint ...
Exploring the Essential Components of a Threat Intelligence Platform
Threat Intelligence Platforms (TIPs) are a great solution to centralize and manage multiple ...
Deep Dive Into Unfading Sea Haze: A New Threat Actor in the South China Sea
In a recent investigation by Bitdefender Labs, a series of cyberattacks targeting high-level ...
Exploring The Spectrum of Threat Intelligence Types
Security companies understand the crucial role threat intelligence (TI) can play in ...
CACTUS: Analyzing a Coordinated Ransomware Attack on Corporate Networks
Bitdefender Labs recently helped with an investigation that unfortunately aligns with two ...
2024 Cybersecurity Outlook: Navigating the Geopolitical Landscape
Welcome to our 2024 Cybersecurity Forecast Series! This is the last of our four expert blogs ...
The Anatomy of a Cyber Threat Takedown: Lessons from a Top Cybersecurity Operative
The dynamics of the cybersecurity landscape have evolved significantly over the last thirty ...
Bitdefender Threat Debrief | November 2023
Monitoring lateral movement across hybrid cloud environments, spanning platforms like Google ...
How Risk Management Can Be Backed by Threat Intelligence
In light of the rising third-party cybersecurity threats in recent years, simply defending ...
The Chain Reaction: New Methods for Extending Local Breaches in Google Workspace
Modern EDR and XDR solutions do not operate deterministically. Instead, they work in shades ...
Using Threat Intelligence to Defend Against Phishing and Fraud Campaigns
For the last decade, cybersecurity has become increasingly vital for organizations in every ...


