Technical Advisory: Proxy*Hell Exploit Chains in the Wild 

At the end of November 2022, experts from Bitdefender Labs started to notice an increase in ...

Race Against the Machine - The Countdown to Adversarial AI

Unless you’ve been living under a rock for the last few months, you’ve probably heard of ...

Deep Dive Into a BackdoorDiplomacy Attack – A Study of an Attacker’s Toolkit

A China-linked cyber espionage operation targeting multiple telecom providers in the Middle ...

Twitter Takeover Raises New Cybersecurity Concerns

While the relevance is debatable, news of Elon Musk’s Twitter takeover has been difficult to ...

Deep Dive into a Cryptojacking Operation

A new cryptojacking campaign was recently discovered by our security researchers from ...

Actionable Threat Intelligence for Cybersecurity

The ever-changing world of cybersecurity has challenged businesses and organizations of all ...

Meet With Bitdefender at VB2022 in Prague

VB conference is an international cybersecurity event hosted by Virus Bulletin, a ...

Tactical Threat Intelligence – Everything You Need to Know

The ever-changing nature of cybersecurity has challenged businesses and organizations of all ...

Will Companies Need A Chief Artificial Intelligence Officer (CAIO)?

The adoption of artificial intelligence (AI) and machine learning (ML) technologies is ...

Operational Threat Intelligence – A Crucial Tool For Cyber Resilience

Cyber Security is paramount in modern business as attacks are constantly evolving and ...

A Tale of Two Threat Intelligence Solutions – Open Source (OSINT) & Commercial

The threat landscape is constantly changing. A few months into the pandemic, as most human ...

Exploring the Latest in Cybersecurity Technologies at the 2022 RSA Conference

Bitdefender recently joined more than 26,000 attendees, 600 speakers and 400 exhibitors at ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware

WATCH NOW