Bitdefender Threat Debrief | July 2022

Managed Detection and Response (MDR) Insights Let’s talk about credential leaks. Whether it’s a new breach or a recycled list, credential leaks remain a valid threat to organizations. Credentials, which…

Join Bitdefender at Black Hat 2022

Black Hat is an internationally recognized cybersecurity conference known for providing cutting-edge security research and technical breakthroughs. It is one of the industry’s most respected information security events, bringing together…

Why SMBs Need To Consider Cyber Insurance

The cybersecurity threat environment is increasingly dangerous. Ransomware attacks are on the rise, doubling in frequency over the last few years, and cloud-based attacks continue to catch insecure companies off-guard.…

A Tale of Two Threat Intelligence Solutions – Open Source (OSINT) & Commercial

The threat landscape is constantly changing. A few months into the pandemic, as most human operations shifted online, the number of attacks reported went through the roof. Everyone shifted to…

Exploring the Latest in Cybersecurity Technologies at the 2022 RSA Conference

Bitdefender recently joined more than 26,000 attendees, 600 speakers and 400 exhibitors at the 2022 RSA Conference in San Francisco, the world’s leading information security conference. As cyber-attacks continue to…

How to Choose a Threat Intelligence Provider

Today’s cyber threats are causing more damage than ever. Cyberattacks inflicted the highest amount of monetary damage history last year, and the toll seems to be mounting this year as…

Deep Dive into the Elephant Framework – A New Cyber Threat in Ukraine

At the beginning of the invasion of Ukraine, we released a security advisory with recommendations based on different risk tiers. Since then, our Threat Intelligence (TI) and Managed Detection and…

Open XDR vs Native XDR

As organizations continue to grow and invest in multiple third-parties, increase their workforce size, and cater to a new normal of remote and hybrid employees working across multiple  locations, new…

CISOs at SMBs Need to Prepare for Zero-Day Vulnerabilities

Zero-day vulnerabilities are among the most worrisome cyber security risks for organizations, because they deal with the unknown and there is little time to mitigate the risks. These are software…

The Clock is Ticking: What to do immediately after a ransomware attack

Ransomware is a fast-growing threat impacting organizations of all sizes, across all industries. Earlier this month, national security authorities in the United States, the United Kingdom and Australia issued advisories…