2024 Cybersecurity Predictions: Changes in the Attack Landscape

Welcome to our 2024 Cybersecurity Forecast Series! This is the third of our four expert ...

2024 Cybersecurity Predictions for AI: A Technical Deep Dive

Welcome to our 2024 Cybersecurity Forecast Series! This is the second of our four expert ...

The Anatomy of a Cyber Threat Takedown: Lessons from a Top Cybersecurity Operative

The dynamics of the cybersecurity landscape have evolved significantly over the last thirty ...

The Chain Reaction: New Methods for Extending Local Breaches in Google Workspace

Modern EDR and XDR solutions do not operate deterministically. Instead, they work in shades ...

Hive Ransomware's Offspring: Hunters International Takes the Stage

In January 2023, the FBI collaborated with law enforcement agencies in Germany and the ...

When Emails Attack: BEC Attack Examples You Can't Ignore

Phishing emails represent a major security risk for businesses, irrespective of their size. ...

Deep Dive into Supply Chain Compromise: Hospitality's Hidden Risks

In today's hospitality industry, vacation rental software has shifted from a luxury to a ...

Bitdefender Threat Debrief | August 2023

MDR Insights: Understanding the Threat Landscape In our previous discussion about Threat ...

What the Cybersecurity Assessment Report Tells Us About the State of Cybersecurity

Cybersecurity teams face increasing pressure as phishing and ransomware attacks grow more ...

Unpacking RDStealer: An Exfiltration Malware Targeting RDP Workloads

In June 2023, Bitdefender Labs published a research paper about espionage operation in East ...

Deep Dive Into DownEx Espionage Operation in Central Asia

In late 2022, Bitdefender Labs detected a cyberattack targeting foreign government ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW