Technical Advisory: Zero-day vulnerability in Microsoft MSHTML allows remote code execution

Technical Advisory: Zero-day vulnerability in Microsoft MSHTML allows remote code execution

by Ashish Chakrabortty, from Business Insights , on 20.09.2021

Quick overview Microsoft recently issued a warning for CVE-2021-40444, a zero-day remote code execution (RCE) vulnerability in MSHTML (Microsoft HTML) which is currently exploiting multiple versions of Windows and Office. read more

Linux and Container Security: Removing module dependencies

Linux and Container Security: Removing module dependencies

by Ashish Chakrabortty, from Business Insights , on 09.09.2021

Bitdefender recently announced GravityZone Security for Containers, expanding our cloud workload security (CWS) by offering run-time support for containers and infrastructures with Linux kernel module (LKM) independence for the Bitdefender technology. read more

Security Issues and Risks of Cloud Computing for SMBs

Security Issues and Risks of Cloud Computing for SMBs

by Business Insights , on 07.09.2021

For small and mid-sized businesses (SMBs), cloud computing services provide an easy and flexible way to access a multitude of applications and the power needed to keep the business running regardless of location. These services provide an environment to rapidly scale and develop new software programs and ecosystems without the need for a heavy investment in infrastructure. read more

Five Myths About Preventing Cyber Security Threats

Five Myths About Preventing Cyber Security Threats

by Business Insights , on 31.08.2021

Cyber security for small and mid-sized businesses (SMBs) is a particularly daunting challenge. These companies face many of the same cyber security threats that the largest global enterprises deal with—but often with a fraction of the resources. Aside from the obvious disadvantages smaller organizations face, there are also a number of misconceptions about security that can get in the way of better protection. read more

Beyond the XDR Hype – A Look at the Forrester New Tech on Extended Detection and Response

Beyond the XDR Hype – A Look at the Forrester New Tech on Extended Detection and Response

by Bogdan Carlescu, from Business Insights , on 26.08.2021

Driven by the need for richer threat context, the Extended Detection and Response (XDR) solutions category is gaining a lot of “market buzz” so far in 2021. In recent months, the industry analyst community has accelerated its research efforts in this area to help guide the market towards a common understanding of XDR. read more

Bitdefender Threat Debrief - July 2021

Bitdefender Threat Debrief - July 2021

by Business Insights , on 25.08.2021

The Bitdefender Threat Debrief (BDTD) is a new monthly series analyzing ransomware news, trends, and research from the previous month. read more

Combatting Ransomware as a Service (RaaS)

Combatting Ransomware as a Service (RaaS)

by Business Insights , on 19.08.2021

Named by many as the “cyber-attack of the year,” the recent Colonial Pipeline ransomware incident caused more than just business disruption - it inflicted considerable economical damage, reminding us how fragile our digital infrastructure is. read more

The Five Biggest Challenges in Healthcare Security Right Now

The Five Biggest Challenges in Healthcare Security Right Now

by Business Insights , on 18.08.2021

The healthcare industry is in the midst of tremendous change. And it comes from the pressure to modernize aging systems, the continued shift to cloud computing, as well as the rapid adoption of telemedicine and electronic medical records. And all during a time of an ongoing pandemic and the continuous targeting of healthcare systems by cybercriminal. read more

Narrowing the Cyber Security Skills Gap

Narrowing the Cyber Security Skills Gap

by Business Insights , on 16.08.2021

The shortage of skills is one of the biggest current challenges facing the cyber security community. Tools and services are widely available to organizations, though few people are qualified to perform the tasks needed in order for cyber security teams to excel. read more

Next >>