The Chain Reaction: New Methods for Extending Local Breaches in Google Workspace

Modern EDR and XDR solutions do not operate deterministically. Instead, they work in shades ...

Hive Ransomware's Offspring: Hunters International Takes the Stage

In January 2023, the FBI collaborated with law enforcement agencies in Germany and the ...

When Emails Attack: BEC Attack Examples You Can't Ignore

Phishing emails represent a major security risk for businesses, irrespective of their size. ...

Deep Dive into Supply Chain Compromise: Hospitality's Hidden Risks

In today's hospitality industry, vacation rental software has shifted from a luxury to a ...

Bitdefender Threat Debrief | August 2023

MDR Insights: Understanding the Threat Landscape In our previous discussion about Threat ...

What the Cybersecurity Assessment Report Tells Us About the State of Cybersecurity

Cybersecurity teams face increasing pressure as phishing and ransomware attacks grow more ...

Unpacking RDStealer: An Exfiltration Malware Targeting RDP Workloads

In June 2023, Bitdefender Labs published a research paper about espionage operation in East ...

Deep Dive Into DownEx Espionage Operation in Central Asia

In late 2022, Bitdefender Labs detected a cyberattack targeting foreign government ...

Observations from RSA 2023

Bitdefender had the pleasure of joining more than 40,000 attendees and 650+ speakers at the ...

Unpacking BellaCiao: A Closer Look at Iran’s Latest Malware

With recent reports that Charming Kitten group (aka Mint Sandstorm) is actively targeting ...

Bitdefender Threat Debrief | April 2023

MDR Insights The recent survey conducted by Bitdefender highlights some concerning trends in ...

Introducing Live Search: A Real-Time Search Enhancement for Threat Hunting and Incident Response

On April 25, 2023, Bitdefender added a new Live Search capability to GravityZone which ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW