-
PCMAG names Bitdefender one of the Best Identity Theft Protection Software for 2022
Here's what PCMAG has to say about our new Identity Theft Protection service and the Ultimate Security suite: "Bitdefender Total Security is our Editors’ Choice winner for feature-rich security mega-suite; Bitdefender Ultimate Security adds comprehensive identity theft protection, as well as Bitdefender’s password manager…
-
Marriott Hacked Again; Attackers Steal 20GB of Data
Hotel chain Marriott has suffered yet another embarrassing breach at the hands of organized hackers who say the lodging giant has very poor cyber defenses. Over the past few years, Marriot has suffered several major breaches, some resulting in hundreds of millions of stolen customer records, lawsuits, and millions in…
-
How MDR Services Can Help Vulnerable Healthcare Organizations
Healthcare organizations have not had the best couple of years when it comes to cybersecurity. 2015 was considered the year of the healthcare breach. Blue Cross Blue Shield, Anthem, and over a dozen more healthcare providers were hacked, resulting in over 100M records leaked. Yet the risk of cybersecurity compromise has…
-
Bitdefender Consumer Threat Landscape Report reveals Top 5 Windows Threats
Of the many threats we’ve seen targeting Windows systems last year, five key categories have remained in place: Trojans, PUA’s, Exploits, Miners and Ransomware. The vast majority of threats detected on Windows platforms in 2021 were trojans, with a 50% share, including specific families like Trickbot, Emoted, Dridex,…
-
Street thugs are forcing victims to unlock phones so they can look for crypto wallets
A tech reporter for the Times had a rather nasty encounter recently and has some unsettling news for anyone relying exclusively on their phone. You can find the article in the link below.
-
Spammers advertise dating platforms to meet Ukrainian women amid crisis
Our colleagues from Bitdefender Labs have picked up an active spam campaign that has been targeting internet users with a mixed bag of online dating opportunities such as mail order bride services and dating platforms where single western men can meet Ukrainian women. Despite the ongoing conflict on Ukrainian soil, many…
-
Flagstar Bank notifies 1.5 million customers of data breach
Michigan-based Flagstar Bank is notifying over 1.5 million customers of a massive data breach that took place during a cyberattack at the end of 2021. According to a letter to impacted customers, Flagstar’s corporate network was compromised in December 2021 when an unauthorized party accessed files containing sensitive…
-
Exploring the Latest in Cybersecurity Technologies at the 2022 RSA Conference
Bitdefender recently joined more than 26,000 attendees, 600 speakers and 400 exhibitors at the 2022 RSA Conference in San Francisco, the world’s leading information security conference. As cyber-attacks continue to grow in frequency and sophistication, the annual RSA Conference plays an important role in bringing together…
-
Coming Surge in Unsupported Android Devices Poses Growing Online Security Threat
Coming September 2022, almost one-third of the world's smartphones running Android will be running an outdated, unsupported operating system. Android devices occupy roughly 70% of the market, but many of those devices pose a security risk as Google no longer supports them. Let’s take a closer look at the Android OS…
-
5 Tips to Protect Your Privacy While Traveling
Traveling is still atop most everyone’s list of favorite activities, whether for vacationing or work. The sheer thought of packing up and visiting another city or country is exhilarating for many, and it’s not hard to see why. However, despite the awesomeness, it involves a series of risks that are not immediately obvious…
-
GravityZone and Nutanix AHV: How Bitdefender promotes security efficiency for cloud workloads
As enterprises shift towards a cloud-first digital environment, the need to address an increased attack surface and new threats continues to rise. An organization’s use of cloud infrastructure promises efficiency and speed for a company's team of developers. However, this tradeoff in operational efficiency doesn’t come…
-
Der Spiegel Says Telegram Gave User Data to German Police in Fight against Terrorism, Child Abuse
Messaging service Telegram has reportedly surrendered user data to German authorities despite maintaining on its website that it never ceded to such requests. Telegram is a cross-platform instant messaging (IM) service best known for its minimal data collection practices and end-to-end encryption (E2EE) qualities that let…
-
US Authorities Shut Down SSNDOB Marketplace Selling Data of over 24 Million People
The US Department of Justice has shut down SSNDOB, a popular darknet marketplace for trading compromised Social Security Numbers, dates of birth, credit card numbers, and other sensitive personally identifiable information (PII). Thought to possess the stolen PII of over 24 million Americans, SSNDOB operated using at least…
-
New Malware Strain ‘SVCReady’ Loads from Word Documents
Security researchers discovered a new malware loader dubbed ‘SVCReady’ in recent phishing attacks. The malware has an atypical way of infecting the compromised device, by loading from Word documents’ properties. SVCReady stores shellcode in the properties of malicious Word documents and executes it through VBA macro code.…
-
2 Million Patient Records Compromised in Largest Healthcare Breach of 2022 So Far
Shields Health Care Group, which provides services to dozens of clinics and hospitals across New England, has disclosed a data breach that affected a whopping 2 million patients. In a notice to affected parties, Shields revealed that the company was alerted to suspicious activity on March 28 that may have involved data…
-
Costa Rica: What Happens When an Attack Shuts Down a Country?
For the last few months, the country has been virtually paralyzed by a bloody ongoing cyberwar with the Russia-affiliated Conti ransomware gang, which in mid-April managed to infiltrate 27 government agencies at various levels in the state hierarchy. Among the worst-hit institutions were the Ministry of Finance, the…
-
United against scammers! Spread the word, raise awareness and help fellow peers
Brand impersonation is a common form of phishing used by hackers in their attempts to gain financial benefits and personal data using the most deceptive techniques. As Bitdefender’s influence in the cyber-security industry grows, there are more scammers pretending to be Bitdefender tech support. The rule of thumb here is…
-
Outlook integration
I can integrate BitDefender into my Outlook (O365), but it seems that the Spam filter doesn't work that well. Usually, when you put a message into junk/spam, a similar message (with the same sender) wouldn't appear again in your Inbox, but more often than not, it does. What can I do differently to get that result? Thanks…
-
Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data
Digital currencies are galvanizing social engineering scams and hacks across the online world. Bitdefender’s latest analysis of crypto-based spam once again reveals the creative side of digital pick pockets as they try to trick internet users. Read the full article below:
-
YouTuber Demonstrates Fake Charging Cable That Can Hack Your Computer
Whether you use Android or an iPhone, you’ve probably collected a fair tangle of charging cables by now: USB-C, micro-USB, mini-USB, lightning, you name it. Moreover, a lot of other devices use the same cables to charge: Bluetooth headphones, speakers, keyboards, mice, photo cameras and more. Chances are you have a…
-
The Return of the Security Widget
Hello everyone, We are happy to announce that the Security widget will be making its return to our Bitdefender products! When? Soon, very soon actually. In Q1 of 2021. Although it is making a return, it'll also get a visual revamp and some under-the-hood changes. Here is a preview of what it will look like once it's back:…
-
Bitdefender launches Identity Theft Protection. A game changer
Identity theft has been around for hundreds of years - probably much longer than historical records show - and the expansion of technology has aggravated this issue. The Internet, data breaches and your ever-growing digital footprint enable cyber-criminals and scammers to carry out digital identity fraud at scale. What Is…
-
Researchers Find Thousands of Websites that Record Everything You Type
Have you ever wondered how some websites know so much about you? Sure, they collect the information you give them when registering an account, and they track your visits using cookies, but that’s all, right? Wrong. Some might also be key-logging you, a behavior that you’d expect from malware but not a legitimate website.…
-
Moved: What about YTBN VIRUS FILES (.YTBN RANSOMWARE) ?
This discussion has been moved.
-
Mozilla Says Many Health and Prayer Apps Are Pose Security Risks
The Mozilla Foundation has recently published its ‘*Privacy Not Included’ guide, underlining potential serious privacy and security issues with most mental health and prayer apps. While very popular, health and prayer apps deal with and store important information about the users. What happens with that info is just as…
-
Looking for XDR in your MDR Partner | How XDR can improve MDR
Over the last two years, it’s clear that organizations, especially enterprises, need to elevate their detection and response capabilities. Environments are much different and the risk has never been greater to organizations. The pandemic has driven and fast tracked the need for digital transformation, largely to…
-
How to Spot a Phishing Attack on Your Phone
Mobile phishing is becoming increasingly popular among cybercriminals as people gullibly interact with the booby traps while refusing to install a security solution on their phone. According to Bitdefender’s 2021 online behaviors report, 61% of internet users experienced at least one cyber threat over the course of the…
-
Bitdefender Labs uncovers a global campaign to distribute RedLine Stealer malware
Threat analysts have uncovered yet a new campaign that uses the RIG Exploit Kit to deliver the RedLine stealer malware. Exploit kits (EKs) have dropped drastically in popularity as they targeted vulnerabilities in web browsers introduced by plug-in software such as the now-defunct Flash Player and Microsoft Sillverlight.…
-
Got a text saying ’your boss‘ left you a voice message? Delete it immediately, it’s a scam.
Lately, people from around the world have reported strange, misspelled text messages saying they have a new voice message from someone close like their spouse, family members, or even their boss. “Who on Earth still uses voice messages in this day and age?” would be a normal reaction. However, many recipients still click…
-
Bitdefender Threat Debrief | April 2022
Security practitioners are familiar with the MITRE ATT&CK Framework, but they are often not familiar with another related project – MITRE ATT&CK Evaluations. This year, 30 security vendors were tested on their ability to detect ransomware and wiper deployments and then provide analytical insights. The results provided are…