<rss version="2.0"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:media="http://search.yahoo.com/mrss/">
    <channel><title>Business Insights Cybersecurity Blog by Bitdefender</title><description>Stay in touch with the latest business cybersecurity news and information provided by Bitdefender Enterprise. Tune up your security knowledge and read our blog!</description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/</link><image><url>https://download.bitdefender.com/resources/images/favicon/favicon-32x32.png</url><title>Business Insights Cybersecurity Blog by Bitdefender</title><link>https://www.bitdefender.com/en-gb/blog/businessinsights/</link></image><generator>Bitdefender Blog</generator><lastBuildDate>Wed, 15 Apr 2026 20:48:38 GMT</lastBuildDate><atom:link href="https://www.bitdefender.com/nuxt/api/en-gb/rss/businessinsights/threat-intelligence/" rel="self" type="application/rss+xml"/><ttl>1800</ttl><item><title>What Mythos Reveals About Zero Trust’s Scope Problem</title><description><![CDATA[The coverage of Anthropic’s Mythos Red Team report has followed a predictable arc: a sensational headline, reactions ranging from alarm to dismissal, and little engagement with what the research actually demonstrates. That is worth correcting, because what Mythos reveals is not primarily a story about AI finding vulnerabilities. It is a story about why trusting software is no longer a viable strategy, and what the architectural response should be. 
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/mythos-reveals-zero-trust-scope-problem</link><guid isPermaLink="false">389419905230</guid><category><![CDATA[SMB Security]]></category><category><![CDATA[Enterprise Security]]></category><category><![CDATA[Threat Research]]></category><category><![CDATA[Endpoint Detection and Response]]></category><category><![CDATA[Threat Intelligence]]></category><dc:creator>Martin Zugec</dc:creator><pubDate>Wed, 08 Apr 2026 17:01:57 GMT</pubDate><media:content url="https://businessresources.bitdefender.com/hubfs/AI-finds-vulnerabilities.png" medium="image"/><content:encoded><![CDATA[The coverage of Anthropic’s Mythos Red Team report has followed a predictable arc: a sensational headline, reactions ranging from alarm to dismissal, and little engagement with what the research actually demonstrates. That is worth correcting, because what Mythos reveals is not primarily a story about AI finding vulnerabilities. It is a story about why trusting software is no longer a viable strategy, and what the architectural response should be. 
]]></content:encoded></item><item><title>Technical Advisory: Axios npm Supply Chain Attack - Cross-Platform RAT Deployed via Compromised Maintainer Account</title><description><![CDATA[[CRITICAL] | Active RAT | Malicious npm versions removed | Assess all systems that ran npm install during exposure window
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/technical-advisory-axios-npm-supply-chain-attack-cross-platform-rat-deployed-compromised-account</link><guid isPermaLink="false">386190544067</guid><category><![CDATA[SMB Security]]></category><category><![CDATA[Enterprise Security]]></category><category><![CDATA[Threat Research]]></category><category><![CDATA[Threat Intelligence]]></category><dc:creator>Martin Zugec</dc:creator><pubDate>Tue, 31 Mar 2026 20:33:53 GMT</pubDate><media:content url="https://341979.fs1.hubspotusercontent-eu1.net/hubfs/341979/supply-chain-security-advisory.png" medium="image"/><content:encoded><![CDATA[[CRITICAL] | Active RAT | Malicious npm versions removed | Assess all systems that ran npm install during exposure window
]]></content:encoded></item><item><title>No Encryptors, No Problem: The Coinbase Cartel Ransomware Group</title><description><![CDATA[The ransomware threat actor Coinbase Cartel first emerged in September 2025 and claimed 14 victims that month. The group focuses on data exfiltration, which aligns with a trend Bitdefender is tracking in the ongoing evolution of ransomware.
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/coinbase-cartel-ransomware-group-extortion-tactics</link><guid isPermaLink="false">361316437221</guid><category><![CDATA[SMB Security]]></category><category><![CDATA[Enterprise Security]]></category><category><![CDATA[Ransomware]]></category><category><![CDATA[Threat Research]]></category><category><![CDATA[Threat Intelligence]]></category><dc:creator>Jade Brown</dc:creator><pubDate>Mon, 09 Feb 2026 17:17:11 GMT</pubDate><media:content url="https://341979.fs1.hubspotusercontent-eu1.net/hubfs/341979/coinbase-exfiltration.jpg" medium="image"/><content:encoded><![CDATA[The ransomware threat actor Coinbase Cartel first emerged in September 2025 and claimed 14 victims that month. The group focuses on data exfiltration, which aligns with a trend Bitdefender is tracking in the ongoing evolution of ransomware.
]]></content:encoded></item><item><title>Technical Advisory: OpenClaw Exploitation in Enterprise Networks</title><description><![CDATA[The promise of autonomous AI agents is rapidly turning into a security beachhead for initial access. Our labs have detected a series of malicious campaigns targeting OpenClaw (formerly known as Moltbot and Clawdbot), an open-source AI agent framework. The attacks are distributed through ClawHub, the public registry for OpenClaw skills. 
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/technical-advisory-openclaw-exploitation-enterprise-networks</link><guid isPermaLink="false">359194811600</guid><category><![CDATA[SMB Security]]></category><category><![CDATA[Enterprise Security]]></category><category><![CDATA[Threat Research]]></category><category><![CDATA[Threat Intelligence]]></category><dc:creator>Martin Zugec</dc:creator><pubDate>Thu, 05 Feb 2026 19:35:07 GMT</pubDate><media:content url="https://341979.fs1.hubspotusercontent-eu1.net/hubfs/341979/open-claw-ai-malware.jpg" medium="image"/><content:encoded><![CDATA[The promise of autonomous AI agents is rapidly turning into a security beachhead for initial access. Our labs have detected a series of malicious campaigns targeting OpenClaw (formerly known as Moltbot and Clawdbot), an open-source AI agent framework. The attacks are distributed through ClawHub, the public registry for OpenClaw skills. 
]]></content:encoded></item><item><title>Bitdefender Threat Debrief | January 2026</title><description><![CDATA[LockBit Is Back! 
This edition of the Bitdefender Threat Debrief covers the latest developments in the ransomware threat landscape, including an update on LockBit’s move to the Top 10, the Coinbase Cartel’s recent activities, a thwarted BreachForums comeback, and more. 
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/bitdefender-threat-debrief-january-2026</link><guid isPermaLink="false">343954959551</guid><category><![CDATA[Ransomware]]></category><category><![CDATA[Threat Research]]></category><category><![CDATA[Bitdefender Threat Debrief]]></category><category><![CDATA[Threat Intelligence]]></category><dc:creator>Jade Brown</dc:creator><pubDate>Tue, 13 Jan 2026 19:26:16 GMT</pubDate><media:content url="https://341979.fs1.hubspotusercontent-eu1.net/hubfs/341979/ransomware-threat-debrief.png" medium="image"/><content:encoded><![CDATA[LockBit Is Back! 
This edition of the Bitdefender Threat Debrief covers the latest developments in the ransomware threat landscape, including an update on LockBit’s move to the Top 10, the Coinbase Cartel’s recent activities, a thwarted BreachForums comeback, and more. 
]]></content:encoded></item><item><title>Cybersecurity Predictions 2026: Hype vs. Reality</title><description><![CDATA[
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/cybersecurity-predictions-2026-hype-vs-reality</link><guid isPermaLink="false">338932703480</guid><category><![CDATA[SMB Security]]></category><category><![CDATA[Enterprise Security]]></category><category><![CDATA[Ransomware]]></category><category><![CDATA[Threat Intelligence]]></category><dc:creator>Martin Zugec</dc:creator><pubDate>Wed, 07 Jan 2026 15:30:37 GMT</pubDate><media:content url="https://341979.fs1.hubspotusercontent-eu1.net/hubfs/341979/Cybersecurity-predictions-2026-road.png" medium="image"/><content:encoded><![CDATA[
]]></content:encoded></item><item><title>Bitdefender Threat Debrief | December 2025</title><description><![CDATA[Growing RaaS Partners and Affiliates Spark Divide on Perceived Connections 
This edition of the Bitdefender Threat Debrief features key events, including updates on RaaS alliances, Qilin’s activity following Korean Leaks, the React2Shell vulnerability, Akria’s potential targets, and more. 
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/bitdefender-threat-debrief-december-2025</link><guid isPermaLink="false">319436805357</guid><category><![CDATA[SMB Security]]></category><category><![CDATA[Enterprise Security]]></category><category><![CDATA[Ransomware]]></category><category><![CDATA[Threat Research]]></category><category><![CDATA[Bitdefender Threat Debrief]]></category><category><![CDATA[Threat Intelligence]]></category><dc:creator>Jade Brown</dc:creator><pubDate>Wed, 10 Dec 2025 13:00:01 GMT</pubDate><media:content url="https://341979.fs1.hubspotusercontent-eu1.net/hubfs/341979/ransomware-threat-debrief.png" medium="image"/><content:encoded><![CDATA[Growing RaaS Partners and Affiliates Spark Divide on Perceived Connections 
This edition of the Bitdefender Threat Debrief features key events, including updates on RaaS alliances, Qilin’s activity following Korean Leaks, the React2Shell vulnerability, Akria’s potential targets, and more. 
]]></content:encoded></item><item><title>ClickFix: A KISS from Cybercriminals</title><description><![CDATA[One of the biggest challenges in threat intelligence is separating the hype from the hazard. We focus too much on complex, scary threats and too little on the dangerous ones - the simple, scalable techniques that work day in and day out. 
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/how-clickfix-cyberattack-technique-works</link><guid isPermaLink="false">318640850165</guid><category><![CDATA[SMB Security]]></category><category><![CDATA[Enterprise Security]]></category><category><![CDATA[Threat Research]]></category><category><![CDATA[Threat Intelligence]]></category><dc:creator>Martin Zugec</dc:creator><pubDate>Tue, 09 Dec 2025 16:21:17 GMT</pubDate><media:content url="https://341979.fs1.hubspotusercontent-eu1.net/hubfs/341979/clickfix-fake-captcha-kiss-v2.png" medium="image"/><content:encoded><![CDATA[One of the biggest challenges in threat intelligence is separating the hype from the hazard. We focus too much on complex, scary threats and too little on the dangerous ones - the simple, scalable techniques that work day in and day out. 
]]></content:encoded></item><item><title>Technical Advisory: React2Shell Critical Unauthenticated RCE in React (CVE-2025-55182)</title><description><![CDATA[TL;DR Ransomware groups are expected to rapidly weaponize this critical (CVSS 10.0) React vulnerability to establish initial access. This vulnerability leads to remote code execution for unauthenticated attacks, and potential impact is similar to Log4j. 
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/advisory-react2shell-critical-unauthenticated-rce-in-react-cve-2025-55182</link><guid isPermaLink="false">315857557732</guid><category><![CDATA[SMB Security]]></category><category><![CDATA[Enterprise Security]]></category><category><![CDATA[Ransomware]]></category><category><![CDATA[Threat Research]]></category><category><![CDATA[Threat Intelligence]]></category><dc:creator>Martin Zugec</dc:creator><pubDate>Thu, 04 Dec 2025 18:40:18 GMT</pubDate><media:content url="https://341979.fs1.hubspotusercontent-eu1.net/hubfs/341979/Technical-Advisory-55182.png" medium="image"/><content:encoded><![CDATA[TL;DR Ransomware groups are expected to rapidly weaponize this critical (CVSS 10.0) React vulnerability to establish initial access. This vulnerability leads to remote code execution for unauthenticated attacks, and potential impact is similar to Log4j. 
]]></content:encoded></item><item><title>The Korean Leaks – Analyzing the Hybrid Geopolitical Campaign Targeting South Korean Financial Services With Qilin RaaS</title><description><![CDATA[TL;DR - The "Korean Leaks" campaign showcases a sophisticated supply chain attack against South Korea's financial sector. This operation combined the capabilities of a major Ransomware-as-a-Service (RaaS) group, Qilin, with potential involvement from North Korean state-affiliated actors (Moonstone Sleet) leveraging Managed Service Provider (MSP) compromise as the initial access vector. 
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/korean-leaks-campaign-targets-south-korean-financial-services-qilin-ransomware</link><guid isPermaLink="false">304680614088</guid><category><![CDATA[Enterprise Security]]></category><category><![CDATA[Ransomware]]></category><category><![CDATA[Threat Research]]></category><category><![CDATA[Advanced Persistent Threats]]></category><category><![CDATA[Threat Intelligence]]></category><dc:creator>Bitdefender Enterprise</dc:creator><pubDate>Mon, 24 Nov 2025 10:50:00 GMT</pubDate><media:content url="https://341979.fs1.hubspotusercontent-eu1.net/hubfs/341979/south_korea.png" medium="image"/><content:encoded><![CDATA[TL;DR - The "Korean Leaks" campaign showcases a sophisticated supply chain attack against South Korea's financial sector. This operation combined the capabilities of a major Ransomware-as-a-Service (RaaS) group, Qilin, with potential involvement from North Korean state-affiliated actors (Moonstone Sleet) leveraging Managed Service Provider (MSP) compromise as the initial access vector. 
]]></content:encoded></item><item><title>Bitdefender Threat Debrief | November 2025</title><description><![CDATA[The ALPHV Insiders: Cyber Defenders Who Cast a Shadow on Enterprise Security  
This edition of the Bitdefender Threat Debrief includes coverage on the indictment of ALPHV affiliates, Qilin’s exponential growth, Sinobi’s return to our Top 10, and more. 
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/bitdefender-threat-debrief-november-2025</link><guid isPermaLink="false">300159969469</guid><category><![CDATA[Ransomware]]></category><category><![CDATA[Threat Research]]></category><category><![CDATA[Bitdefender Threat Debrief]]></category><category><![CDATA[Threat Intelligence]]></category><dc:creator>Jade Brown</dc:creator><pubDate>Thu, 13 Nov 2025 16:19:55 GMT</pubDate><media:content url="https://341979.fs1.hubspotusercontent-eu1.net/hubfs/341979/BD_BDTD_Image-3.jpg" medium="image"/><content:encoded><![CDATA[The ALPHV Insiders: Cyber Defenders Who Cast a Shadow on Enterprise Security  
This edition of the Bitdefender Threat Debrief includes coverage on the indictment of ALPHV affiliates, Qilin’s exponential growth, Sinobi’s return to our Top 10, and more. 
]]></content:encoded></item><item><title>Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines</title><description><![CDATA[I'd like to thank my coauthors Adrian Schipor and Martin Zugec for their invaluable contributions to this research. 
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/curly-comrades-evasion-persistence-hidden-hyper-v-virtual-machines</link><guid isPermaLink="false">295416147160</guid><category><![CDATA[SMB Security]]></category><category><![CDATA[Enterprise Security]]></category><category><![CDATA[Threat Research]]></category><category><![CDATA[Endpoint Detection and Response]]></category><category><![CDATA[Advanced Persistent Threats]]></category><category><![CDATA[Threat Intelligence]]></category><dc:creator>Victor Vrabie</dc:creator><pubDate>Tue, 04 Nov 2025 13:55:00 GMT</pubDate><media:content url="https://businessresources.bitdefender.com/hubfs/curly-comrades-target-virtual-machines.jpg" medium="image"/><content:encoded><![CDATA[I'd like to thank my coauthors Adrian Schipor and Martin Zugec for their invaluable contributions to this research. 
]]></content:encoded></item><item><title>Technical Advisory: Critical Unauthenticated RCE in Windows Server Update Services (WSUS) - CVE-2025-59287</title><description><![CDATA[TL;DR Our telemetry indicates an active exploitation campaign targeting vulnerable Windows Server Update Services (WSUS) systems via CVE-2025-59287 (CVSS 9.8 – Critical).  
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/bitdefender-advisory-critical-unauthenticated-rce-windows-server-update-services-cve-2025-59287</link><guid isPermaLink="false">292461592795</guid><category><![CDATA[SMB Security]]></category><category><![CDATA[Enterprise Security]]></category><category><![CDATA[Ransomware]]></category><category><![CDATA[Threat Research]]></category><category><![CDATA[Threat Intelligence]]></category><dc:creator>Martin Zugec</dc:creator><pubDate>Tue, 28 Oct 2025 19:40:22 GMT</pubDate><media:content url="https://341979.fs1.hubspotusercontent-eu1.net/hubfs/341979/Bitdefender-blank.png" medium="image"/><content:encoded><![CDATA[TL;DR Our telemetry indicates an active exploitation campaign targeting vulnerable Windows Server Update Services (WSUS) systems via CVE-2025-59287 (CVSS 9.8 – Critical).  
]]></content:encoded></item><item><title>Bitdefender Threat Debrief | October 2025</title><description><![CDATA[LockBit Lives On with Version 5.0 and a New Partnership
This edition of the Bitdefender Threat Debrief covers developments that include LockBit’s return, a new Clop campaign, revived groups, and more.
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/bitdefender-threat-debrief-october-2025</link><guid isPermaLink="false">286984001764</guid><category><![CDATA[Ransomware]]></category><category><![CDATA[Threat Research]]></category><category><![CDATA[Bitdefender Threat Debrief]]></category><category><![CDATA[Threat Intelligence]]></category><dc:creator>Jade Brown</dc:creator><pubDate>Tue, 14 Oct 2025 19:07:20 GMT</pubDate><media:content url="https://341979.fs1.hubspotusercontent-eu1.net/hubfs/341979/BD_BDTD_Image-3.png" medium="image"/><content:encoded><![CDATA[LockBit Lives On with Version 5.0 and a New Partnership
This edition of the Bitdefender Threat Debrief covers developments that include LockBit’s return, a new Clop campaign, revived groups, and more.
]]></content:encoded></item><item><title>EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company</title><description><![CDATA[I'd like to thank my coauthors, Victor Vrabie, Adrian Schipor, and Martin Zugec, for their invaluable contributions to this research.
TL;DR A Chinese APT group compromised a Philippine military company using a new, fileless malware framework called EggStreme. This multi-stage toolset achieves persistent, low-profile espionage by injecting malicious code directly into memory and leveraging DLL sideloading to execute payloads. The core component, EggStremeAgent, is a full-featured backdoor that enables extensive system reconnaissance, lateral movement, and data theft via an injected keylogger. 
]]></description><link>https://www.bitdefender.com/en-gb/blog/businessinsights/eggstreme-fileless-malware-cyberattack-apac</link><guid isPermaLink="false">271740682472</guid><category><![CDATA[Enterprise Security]]></category><category><![CDATA[Threat Research]]></category><category><![CDATA[Advanced Persistent Threats]]></category><category><![CDATA[Threat Intelligence]]></category><dc:creator>Bogdan Zavadovschi</dc:creator><pubDate>Wed, 17 Sep 2025 19:11:34 GMT</pubDate><media:content url="https://341979.fs1.hubspotusercontent-eu1.net/hubfs/341979/eggstreme-keylogger-malware-with-flag.png" medium="image"/><content:encoded><![CDATA[I'd like to thank my coauthors, Victor Vrabie, Adrian Schipor, and Martin Zugec, for their invaluable contributions to this research.
TL;DR A Chinese APT group compromised a Philippine military company using a new, fileless malware framework called EggStreme. This multi-stage toolset achieves persistent, low-profile espionage by injecting malicious code directly into memory and leveraging DLL sideloading to execute payloads. The core component, EggStremeAgent, is a full-featured backdoor that enables extensive system reconnaissance, lateral movement, and data theft via an injected keylogger. 
]]></content:encoded></item></channel>
        </rss>