The Chain Reaction: New Methods for Extending Local Breaches in Google Workspace
Modern EDR and XDR solutions do not operate deterministically. Instead, they work in shades ...
Hive Ransomware's Offspring: Hunters International Takes the Stage
In January 2023, the FBI collaborated with law enforcement agencies in Germany and the ...
When Emails Attack: BEC Attack Examples You Can't Ignore
Phishing emails represent a major security risk for businesses, irrespective of their size. ...
Deep Dive into Supply Chain Compromise: Hospitality's Hidden Risks
In today's hospitality industry, vacation rental software has shifted from a luxury to a ...
Bitdefender Threat Debrief | August 2023
MDR Insights: Understanding the Threat Landscape In our previous discussion about Threat ...
What the Cybersecurity Assessment Report Tells Us About the State of Cybersecurity
Cybersecurity teams face increasing pressure as phishing and ransomware attacks grow more ...
Unpacking RDStealer: An Exfiltration Malware Targeting RDP Workloads
In June 2023, Bitdefender Labs published a research paper about espionage operation in East ...
Deep Dive Into DownEx Espionage Operation in Central Asia
In late 2022, Bitdefender Labs detected a cyberattack targeting foreign government ...
Observations from RSA 2023
Bitdefender had the pleasure of joining more than 40,000 attendees and 650+ speakers at the ...
Unpacking BellaCiao: A Closer Look at Iran’s Latest Malware
With recent reports that Charming Kitten group (aka Mint Sandstorm) is actively targeting ...
Bitdefender Threat Debrief | April 2023
MDR Insights The recent survey conducted by Bitdefender highlights some concerning trends in ...
Introducing Live Search: A Real-Time Search Enhancement for Threat Hunting and Incident Response
On April 25, 2023, Bitdefender added a new Live Search capability to GravityZone which ...