2024 Cybersecurity Predictions: Changes in the Attack Landscape
Welcome to our 2024 Cybersecurity Forecast Series! This is the third of our four expert ...
2024 Cybersecurity Predictions for AI: A Technical Deep Dive
Welcome to our 2024 Cybersecurity Forecast Series! This is the second of our four expert ...
The Anatomy of a Cyber Threat Takedown: Lessons from a Top Cybersecurity Operative
The dynamics of the cybersecurity landscape have evolved significantly over the last thirty ...
The Chain Reaction: New Methods for Extending Local Breaches in Google Workspace
Modern EDR and XDR solutions do not operate deterministically. Instead, they work in shades ...
Hive Ransomware's Offspring: Hunters International Takes the Stage
In January 2023, the FBI collaborated with law enforcement agencies in Germany and the ...
When Emails Attack: BEC Attack Examples You Can't Ignore
Phishing emails represent a major security risk for businesses, irrespective of their size. ...
Deep Dive into Supply Chain Compromise: Hospitality's Hidden Risks
In today's hospitality industry, vacation rental software has shifted from a luxury to a ...
Bitdefender Threat Debrief | August 2023
MDR Insights: Understanding the Threat Landscape In our previous discussion about Threat ...
What the Cybersecurity Assessment Report Tells Us About the State of Cybersecurity
Cybersecurity teams face increasing pressure as phishing and ransomware attacks grow more ...
Unpacking RDStealer: An Exfiltration Malware Targeting RDP Workloads
In June 2023, Bitdefender Labs published a research paper about espionage operation in East ...
Deep Dive Into DownEx Espionage Operation in Central Asia
In late 2022, Bitdefender Labs detected a cyberattack targeting foreign government ...