News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Welcome to the Bitdefender partner channel

Here you will find all articles, news and whitepapers published by Bitdefender, sorted by date. All information and texts in the partner channel can also be easily shared on social media. The links at the end of the article will take you to the Bitdefender website or directly to white papers or studies.

Read more

Posted in Bitdefender comments off for Welcome to the Bitdefender Partner Channel
Ransomware: Cybercriminals are becoming more professional
Ransomware: Cybercriminals are becoming more professional

Cybercriminals act profit-oriented, as we know from companies, and continue to professionalize and rationalize their attack methods. That's why 2024 will be another year of ransomware. In 2024, we can expect the ransomware industry to become more opportunistic, said Martin Zugec, Technical Solutions Director at Bitdefender. This trend culminated in the CitrixBleed attack in 2023. The security experts at Bitdefender Labs believe that the following trends will dominate ransomware activity this year: 1. Accelerated exploitation of zero-day exploits Cybercriminals who rationally and efficiently use automated scans...

Read more

Cyberattacks: These four industries are the main targets
Cyberattacks: These four industries are the main targets

Healthcare, financial services, manufacturing companies, software-as-a-service and software providers are the industries that are most often the involuntary recipients of current malware campaigns. All areas of the economy and society are undergoing fundamental change. The long-term mission of digital transformation is accompanied by current challenges such as the pandemic and its consequences as well as the war in Ukraine. Politicians are responding to increased risk situations with new and stricter IT guidelines for an expanded circle of those affected. Even though companies of all sizes and industries are currently experiencing a sharp increase in hacker attacks, cybercriminals have different intentions behind these incidents. For all target groups…

Read more

Hunters International – the new Hive on the ransomware stage
Hunters International - the new Hive on the ransomware stage

The new group “Hunters International” describes itself as the successor to the HIVE ransomware gangsters. An analysis of the ransomware code confirms this and shows how the criminals have improved their malware attacks. Hunters International is at the beginning of its activities with first victims in Germany, Great Britain, the United States of America and Namibia. The Hive group was exposed in January 2023 as the result of a concerted effort by the FBI, the BKA, the Reutlingen police headquarters and Dutch authorities. Hive's victims included 1.500 hospitals, school boards, financial services and other organizations whose information the attackers exposed. Hive…

Read more

Hospitality industry: Attacks on booking platform
Bitdefender_News

Cybercriminals stole the credit card details, personal information and passwords of customers of the restaurant booking platform IRM-NG. Bitdefender has published the latest research results from a cyber criminal campaign currently underway on the IRM-NG booking platform used in the hotel and hospitality industry. The attackers use vulnerabilities in the platform in combination with backdoors and techniques to bypass password validation on the end device and thus steal credit card data, passwords and customers' personal data. Security gap still exists Bitdefender has not received any response from the manufacturer Resort Data Processing (RDP) to its information for months. The vulnerability still exists and…

Read more

Even Apple hardware isn't secure per se
Bitdefender_News

Bitdefender Labs has evaluated global data on the threat level for macOS systems: Apple hardware is also a target for hackers. The results of the 2022 global telemetry numbers show that Apple hardware is targeted by cybercriminals, although to a lesser extent than Windows devices. The more widely used Windows or Android devices are more attractive to hackers. The results show: macOS hardware is not inherently secure. Top risks included Trojans at 51,8%, Potentially Unwanted Applications (PUA) at 25,3% and adware at 22,6%. 18 percent of all attacks...

Read more

Security: mood among IT managers in medium-sized companies

When it comes to cybersecurity, the mood among IT managers in upper German medium-sized companies is cautiously optimistic. 69 percent plan to spend more money on IT security. 98 percent are confident they have tools, strategies and money for IT security. The 2023 Cybersecurity Assessment Report presented by Bitdefender not only paints a global picture of the cybersecurity situation. The survey of 400 IT and cybersecurity experts from IT manager to CISO in companies with 1.000 or more employees in the USA, Great Britain, France, Germany, Italy and Spain shows: Even in a European comparison, decision-makers in…

Read more

Cloud-based GravityZone Security for Mobile
Cloud-based GravityZone Security for Mobile - Photo by Maxim Ilyahov on Unsplash

Bitdefender has introduced its GravityZone Security for Mobile, an extension of the well-known security platform GravityZone that works completely cloud-based. This means that Unified Security is now also available on Android, iOS and Chromebooks. Businesses can now identify and respond to cyber threats to Android, iOS-based devices and Chromebooks as quickly as possible. End customers as well as Managed Service Providers (MSPs) also benefit from full visibility of their mobile IT infrastructure. 6,8 billion smartphones in use More than 6,8 billion smartphones are in use worldwide, many of which are also used in a business context, sometimes as "Bring Your Own...

Read more

Trends for Managed Detection and Response
Trends for Managed Detection and Response Photo by Austin Distel on Unsplash

Services such as Managed Detection and Response (MDR) or Managed Security Services are among the most important current trends in IT security. The demand is the reaction to the upheavals in cyber security in recent years, also because of the problem of skilled workers. A problem that affects all companies when it comes to IT security: A rapidly developing danger landscape with more risks and at the same time an increasing shortage of specialists. More and more companies are therefore forced to look out for external help from suitable partners. Companies have to react – to greater demands from new risks and to…

Read more

Mobile security with app anomaly detection
Bitdefender_News

Otherwise harmless apps can suddenly be compromised after the update, as can newly installed apps. Bitdefender has integrated a new app anomaly detection function into its Mobile Security for Android, which immediately reports malfunctions even from otherwise trustworthy apps. Bitdefender introduces a new App Anomaly Detection feature: the industry's first real-time, behavior-based protection layer against anomalous app behavior. It is now part of Bitdefender Mobile Security for Android and continuously detects anomalous and malicious behavior in Android applications as soon as they occur. Anomaly behavior is detected Bitdefender App offers Anomaly Detection as a novel feature in which Bitdefender Malware…

Read more

Iranian APT Group Charming Kitten Attacks US & Europe
Iranian APT group Charming-Kitten attacks USA & Europe

Iranian-led APT group Charming Kitten (aka Mint Sandstorm) is behind the new BellaCiao malware campaign targeting organizations in the US, Europe, Israel, Turkey and India. New to the attack: The malware is used as hard code. In its current report, Bitdefender Labs analyzes the attack methods of the new active malware campaign BellaCiao. The well-known Iranian Charming Kitten group uses it to initially search for vulnerabilities in an opportunistic and automated manner before launching highly sophisticated malware attacks that are individually tailored to the individual victims. They then attack the targets using a novel command-and-control (CC) infrastructure. Hackers can...

Read more