Latest Security Whitepapers

CENSORNET: Empowering the People: Critical Cyber Security Challenges
We are at a new defining moment in the history of work and technology. Since the COVID-19 lockdown began, security and IT professionals across the globe have faced extraordinary challenges. Practically overnight, almost every employee became a ‘remote worker’, leaving most organisations in a position of increased exposure on an escalating scale. Now with uncertainty... Read More

McAfee MVISION Cloud Security: 360° Shared Responsibility Model
Introduction Shared responsibility models are important for effective security in computing. Security and compliance are everyone’s responsibility and not only something delivered only by the IT group. For cloud computing, cloud service providers (CSPs) provide some security protection. However, that doesn’t mean that cloud data is fully secure. CSPs correctly point out that the responsibility... Read More

2020 Application Security Observability Report
Contrast’s “2020 Application Security Observability Report” provides insights gleaned from analysis of aggregate telemetry generated from applications during development, testing, and operations from Contrast Security customers between June 2019 and May 2020. Key findings include: • Vulnerabilities. Nearly all applications have at least one vulnerability, and more than one-quarter have a serious one. 11% of... Read More

Cloud Adoption and Risk Report: Work From Home Edition
The recent work from home mandate has dramatically changed how we live and work. Organizations are getting creative about how they can continue to operate productively when most of their employees are working from home. In normal times, most employees would be expected to work in the office, on the internal network. For anyone working... Read More

Spear Phishing: Top Threats and Trends
A specialized economy is emerging around email account takeover as cybercriminals find new ways to attack and exploit email accounts. This report takes an in-depth look at the threats organizations face from account takeover and the types of defense strategies you need to have in place to protect against these types of attacks.» Download the... Read More

Petya Ransomware Goes Low Level
Executive Summary The new Petya ransomware seems to have been built with speed in mind, as to expedite the encryption process. While traditional ransomware encrypts files one by one, Petya encrypts the location containing all information about disk files, such as size, permissions, and data content, essentially preventing users from accessing all their data. While... Read More

13 email threat types to know about right now
Radically reduce susceptibility to targeted email attacks A cyberattack can affect your business in many ways, depending on its nature, scope, and severity. According to the FBI’s Internet Crime Complaint Center (IC3), cybercrime cost $3.5 billion in losses in 2019 alone, with business email compromise (BEC) causing the most damages. That doesn’t include unreported losses,... Read More

Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years
Even though similar financially motivated Android threats such as Anubis or Ginp were discovered, Mandrake stood in the shadow for at least 4 years. During this time, it stole data from at least tens of thousands of users. “It takes special care not to infect everyone” – This is exactly what the actor did and... Read More

Hacked Off!
Introducing Bitdefender Hacked Off! A comprehensive study into the cybersecurity attitudes of infosecurity professionals around the world. “From organisational weaknesses to infosec professionals’ pressure points and what they’re doing to combat them, Hacked Off! aims to shine a light on the current state of play of the global cybersecurity landscape by focusing on three core... Read More

Securing complex infrastructures in healthcare organizations with Bitdefender GravityZone
Healthcare IT infrastructure - vital and always changing Technology has become indispensable to how healthcare is distributed and how effective it is. In the process, IT infrastructure in the sector has become increasingly intricate to accommodate progressively specific needs and boost productivity. The industry’s digital transformation is also adding layers of complexity and changing workflows.... Read More

Northstar elevates quality of IT services with cybersecurity
When you’re in the business of helping organizations manage their IT environments, security needs to be a top priority. Yet Northstar Services Ltd., a major IT services provider in the U.K., found that even with well-known security solutions, infections were attacking clients’ systems almost weekly and endpoints were running slowly. To address these shortcomings, Northstar’s... Read More

The indelible impact of COVID-19 on Cybersecurity
This report from BitDefender, which will form part of the yet to be released 10 in 10 Study, details the pressures faced by IT professionals during the COVID-19, how these pressures are testing the effectiveness of security measures and the changes they will need to make within their organisations as a result. All audience members... Read More

Subscribe for News in Your Inbox