How can we help?
Your Account
Log in to your Bitdefender account and manage security for what matters.
Complete protection and unlimited VPN for 10 users.
Complete protection for 5 or 10 devices. Limited VPN.
Windows only security with limited VPN.
Basic protection for Windows only.
Basic protection for Mac only.
Ultra-fast VPN that keeps your online identity and activities safe from hackers, ISP's and snoops.
Live Support offered by certified experts
Prevention, Hardening, Risk, and Incident Analytics
Integrated Prevention, EDR and Risk Analytics
Detect, discover, hunt, and respond across your organization.
Advanced attack visibility with guided investigation
SOC-Driven, Security-Focused Outcomes
Next-Gen AV for Small Businesses
Protection for Virtual Servers and Desktops
Cloud-based Email Security
Purpose-built Container and Linux security
Advanced MSP Security Suite
Optimized protection for AWS
Researchers from Google’s Threat Analysis Group (TAG) yesterday disclosed that certain Internet Service Providers (ISPs) helped Italian spyware vendor RCS Labs infect iOS and Android users in Italy and Kazakhstan with surveillance tools. TAG tracks more than 30 spyware vendors, including RCS Labs, according to [https://blog.google/threat-analysis-group/protecting-android-users-from-0-day-attacks/] security researchers Clement Lecigne and Christian Resell. The attacks used drive-by-downloads to
Taiwanese network-attached storage (NAS) device maker QNAP announced yesterday it’s taking steps to fix a high-severity PHP vulnerability that could put devices at risk from remote attacks. The three-year-old flaw, tracked as CVE-2019-11043 [https://nvd.nist.gov/vuln/detail/CVE-2019-11043], has a CVSS severity score of 9.8 and affects several PHP versions. Affected PHP versions: * 7.1.x below 7.1.33 * 7.2.x below 7.2.24 * 7.3.x below 7.3.11 “In PHP versions 7.1.x below 7.1.33, 7.2.x below
Last week, the research team at Safety Detectives revealed a major data leak stemming from an unsecured database belonging to Malaysian point-of-sale (POS) software provider StoreHub. According to the report [https://www.safetydetectives.com/news/storehub-leak-report/], the exposed data was found on a misconfigured Elasticsearch server lacking password protection and encryption. Upon analysis, investigators found 1.7 billion records and over 1 terabyte of data exposing personal information of
2021 marked a peak in digital activity around the globe, mainly driven by the COVID pandemic. The rapid digitalization of work, services and other daily activities meant cybercriminals could prey on the low-hanging fruit, day in and day out, by distributing malware and social engineering campaigns meant to capitalize on the disrupted landscape. As digital activity reached an all-time high in 2021, careless consumer behavior further fueled the rapid expansion of the global cyberthreat landscape.