Will Companies Need A Chief Artificial Intelligence Officer (CAIO)?
The adoption of artificial intelligence (AI) and machine learning (ML) technologies is ...
Operational Threat Intelligence – A Crucial Tool For Cyber Resilience
Cyber Security is paramount in modern business as attacks are constantly evolving and ...
A Tale of Two Threat Intelligence Solutions – Open Source (OSINT) & Commercial
The threat landscape is constantly changing. A few months into the pandemic, as most human ...
Exploring the Latest in Cybersecurity Technologies at the 2022 RSA Conference
Bitdefender recently joined more than 26,000 attendees, 600 speakers and 400 exhibitors at ...
Bitdefender Threat Debrief | June 2022
Highlight of the Month: CVE-2022-30190 Zero-Day Vulnerability “Follina” Bitdefender has been ...
Homograph Phishing Attacks - When User Awareness Is Not Enough
Microsoft Office vulnerable to homograph attacks Homograph (also known as homoglyph) ...
Technical Advisory: CVE-2022-30190 Zero-day Vulnerability “Follina” in Microsoft Support Diagnostic Tool
Quick Overview On Monday, May 30, 2022, Microsoft issued CVE-2022-30190, a zero-day remote ...
The Origin of Ransomware - Exploring the evolution of one of cybersecurity’s most prolific threats
Ransomware – where an attacker steals or freezes an organizations’ computer systems or data ...
Join Bitdefender at the 2022 RSA Conference
The RSA Conference is where the world comes together to talk cybersecurity. As one of the ...
Bitdefender Threat Debrief | April 2022
Highlight of the month: MITRE ATT&CK Evaluations 2022 Security practitioners are ...
Deep Dive into the Elephant Framework – A New Cyber Threat in Ukraine
At the beginning of the invasion of Ukraine, we released a security advisory with ...
Bitdefender Recognized as a Strong Performer in Endpoint Detection and Response
Every endpoint in an organization – from employee computers and mobile devices, to servers, ...