<rss version="2.0"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:media="http://search.yahoo.com/mrss/">
    <channel><title>Bitdefender Labs</title><description>Daily source of cyber-threat information. Established 2001.</description><link>https://www.bitdefender.com/en-us/blog/labs/</link><image><url>https://download.bitdefender.com/resources/images/favicon/favicon-32x32.png</url><title>Bitdefender Labs</title><link>https://www.bitdefender.com/en-us/blog/labs/</link></image><generator>Bitdefender Blog</generator><lastBuildDate>Fri, 01 May 2026 10:09:47 GMT</lastBuildDate><atom:link href="https://www.bitdefender.com/nuxt/api/en-us/rss/labs/miscellaneous/" rel="self" type="application/rss+xml"/><ttl>1800</ttl><item><title>App Anomaly Detection Technology From Bitdefender to Protect Against Yet-Unknown Threats</title><description><![CDATA[With the introduction of the industry-first technology named App Anomaly Detection into Bitdefender’s Mobile Security for Android solution, users gain a new layer of protection from malware that has never even been seen before.

Attackers continuously work to develop new ways to compromise Android phones and tablets via official stores, third-party websites or manual installation. Of course, tricking people into downloading and installing malware of their own volition is a widely used attack met]]></description><link>https://www.bitdefender.com/en-us/blog/labs/app-anomaly-detection-technology-from-bitdefender-to-protect-against-yet-unknown-threats</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722ba</guid><category><![CDATA[Miscellaneous]]></category><dc:creator>Silviu STAHIE</dc:creator><pubDate>Thu, 11 May 2023 13:00:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2023/05/unlock-g84f9ff196_1280.png" medium="image"/><content:encoded><![CDATA[With the introduction of the industry-first technology named App Anomaly Detection into Bitdefender’s Mobile Security for Android solution, users gain a new layer of protection from malware that has never even been seen before.

Attackers continuously work to develop new ways to compromise Android phones and tablets via official stores, third-party websites or manual installation. Of course, tricking people into downloading and installing malware of their own volition is a widely used attack met]]></content:encoded></item><item><title>A Red Team Perspective on the Device42 Asset Management Appliance</title><description><![CDATA[Modern IT environments rely on automatic discovery, asset management, and dependency mapping.

Whether based on agents or completely agentless, these tools allow IT infrastructure managers to create a complete inventory of networked devices, servers and hypervisors, applications, and more.

While investigating the Device42 platform, we found multiple severe security issues exploitable by attackers with any level of access within the host network.

By exploiting these issues, an attacker could im]]></description><link>https://www.bitdefender.com/en-us/blog/labs/a-red-team-perspective-on-the-device42-asset-management-appliance</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722aa</guid><category><![CDATA[Whitepapers]]></category><category><![CDATA[Miscellaneous]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Wed, 10 Aug 2022 10:00:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2022/08/Internet_Security_Concept_-_Safe_and_Secure_Network.jpg" medium="image"/><content:encoded><![CDATA[Modern IT environments rely on automatic discovery, asset management, and dependency mapping.

Whether based on agents or completely agentless, these tools allow IT infrastructure managers to create a complete inventory of networked devices, servers and hypervisors, applications, and more.

While investigating the Device42 platform, we found multiple severe security issues exploitable by attackers with any level of access within the host network.

By exploiting these issues, an attacker could im]]></content:encoded></item><item><title>Bitdefender Honeypots Signal Active Log4Shell 0-Day Attacks Underway; Patch Immediately</title><description><![CDATA[Log4Shell is a 0-day vulnerability in the Log4j Java library that allows attackers to download and run scripts on targeted servers, leaving them open to complete remote control. After a user posted a proof-of-concept (PoC) on Twitter, Bitdefender’s honeypots started to register attacks using the PoC, underlining just how severe this vulnerability is.

Log4j is not just another Java library. It’s embedded in servers and services from all over the world, used by companies such as Apple, Amazon, Cl]]></description><link>https://www.bitdefender.com/en-us/blog/labs/bitdefender-honeypots-signal-active-log4shell-0-day-attacks-underway-patch-immediately</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d7229d</guid><category><![CDATA[Miscellaneous]]></category><dc:creator>Silviu STAHIE</dc:creator><pubDate>Fri, 10 Dec 2021 19:46:17 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2021/12/markus-spiske-70Rir5vB96U-unsplash.jpg" medium="image"/><content:encoded><![CDATA[Log4Shell is a 0-day vulnerability in the Log4j Java library that allows attackers to download and run scripts on targeted servers, leaving them open to complete remote control. After a user posted a proof-of-concept (PoC) on Twitter, Bitdefender’s honeypots started to register attacks using the PoC, underlining just how severe this vulnerability is.

Log4j is not just another Java library. It’s embedded in servers and services from all over the world, used by companies such as Apple, Amazon, Cl]]></content:encoded></item><item><title>A Note from the Bitdefender Labs Team on Ransomware and Decryptors</title><description><![CDATA[The news this week about our release of a decryptor for Darkside in January 2021 has sparked a conversation about whether researchers (including those who work for cybersecurity companies) should communicate the release of ransomware decryptors to the public. In the security industry, debate helps us all improve our defense, and we encourage and welcome this dialog.

As one of the industry’s largest and most active research teams involved in anti-ransomware activity (both from a decryptor/techno]]></description><link>https://www.bitdefender.com/en-us/blog/labs/a-note-from-the-bitdefender-labs-team-on-ransomware-and-decryptors</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d72292</guid><category><![CDATA[Miscellaneous]]></category><dc:creator>Alexandru "JAY" BĂLAN</dc:creator><pubDate>Wed, 26 May 2021 07:58:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2021/06/ransomware-2318381_1920.jpg" medium="image"/><content:encoded><![CDATA[The news this week about our release of a decryptor for Darkside in January 2021 has sparked a conversation about whether researchers (including those who work for cybersecurity companies) should communicate the release of ransomware decryptors to the public. In the security industry, debate helps us all improve our defense, and we encourage and welcome this dialog.

As one of the industry’s largest and most active research teams involved in anti-ransomware activity (both from a decryptor/techno]]></content:encoded></item><item><title>Golang Bot Starts Targeting WordPress Websites</title><description><![CDATA[Bitdefender researchers have identified a new version of an already-known vulnerability scanner that looks for a specific flaw in the “Ultimate GDPR & CCPA Compliance Toolkit” plugin for WordPress.

Zero-day vulnerabilities get all the attention, but n-day vulnerabilities cause most security issues. These flaws are already known, and many already have patches. The problem is that people and companies don’t patch their systems or software, giving attackers a way in.

Bitdefender security research]]></description><link>https://www.bitdefender.com/en-us/blog/labs/golang-bot-starts-targeting-wordpress-websites</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d7228a</guid><category><![CDATA[Miscellaneous]]></category><dc:creator>Silvia PRIPOAE</dc:creator><pubDate>Wed, 24 Mar 2021 14:32:44 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/wordpress/2021/03/wordpress-581849_1920.jpg" medium="image"/><content:encoded><![CDATA[Bitdefender researchers have identified a new version of an already-known vulnerability scanner that looks for a specific flaw in the “Ultimate GDPR & CCPA Compliance Toolkit” plugin for WordPress.

Zero-day vulnerabilities get all the attention, but n-day vulnerabilities cause most security issues. These flaws are already known, and many already have patches. The problem is that people and companies don’t patch their systems or software, giving attackers a way in.

Bitdefender security research]]></content:encoded></item><item><title>Towards a Universal Security Solution against Bluetooth Low Energy Attacks</title><description><![CDATA[


For the past couple of years, Bluetooth has become the de-facto standard in low-range communication, with a particular impact on smart home and IoT development. From smart speakers to smart lights and everything in between, Bluetooth makes connectivity and communication as easy as pressing a button.





Over the years, the research community has uncovered and documented a wide range of security flaws in BLE devices. By far, the most prevalent hacks against BLE involve capturing handshakes, h]]></description><link>https://www.bitdefender.com/en-us/blog/labs/towards-a-universal-security-solution-against-bluetooth-low-energy-attacks</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d72277</guid><category><![CDATA[Miscellaneous]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Mon, 13 Jul 2020 11:32:56 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/wordpress/2020/07/bluetooth-1690677.png" medium="image"/><content:encoded><![CDATA[


For the past couple of years, Bluetooth has become the de-facto standard in low-range communication, with a particular impact on smart home and IoT development. From smart speakers to smart lights and everything in between, Bluetooth makes connectivity and communication as easy as pressing a button.





Over the years, the research community has uncovered and documented a wide range of security flaws in BLE devices. By far, the most prevalent hacks against BLE involve capturing handshakes, h]]></content:encoded></item><item><title>Global Ransomware and Cyberattacks on Healthcare Spike during Pandemic</title><description><![CDATA[


With healthcare systems under constant strain amid the SARS-CoV-2 global pandemic, hospitals and healthcare facilities around the world have also been hit by a wave of cyberattacks, including ransomware attacks. While officials have already issued warnings that hospitals, governments and universities may be more conscious about losing data and access to critical systems, Bitdefender telemetry reveals that the number of cyberattacks and ransomware incidents directly targeting healthcare signif]]></description><link>https://www.bitdefender.com/en-us/blog/labs/global-ransomware-and-cyberattacks-on-healthcare-spike-during-pandemic</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d7226e</guid><category><![CDATA[Anti-Malware Research]]></category><category><![CDATA[Miscellaneous]]></category><dc:creator>Liviu ARSENE</dc:creator><pubDate>Wed, 13 May 2020 15:50:02 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/wordpress/2020/05/global-ransomware-and-cyberattacks-on-healthcare-spike-during-pandemic-featured.jpg" medium="image"/><content:encoded><![CDATA[


With healthcare systems under constant strain amid the SARS-CoV-2 global pandemic, hospitals and healthcare facilities around the world have also been hit by a wave of cyberattacks, including ransomware attacks. While officials have already issued warnings that hospitals, governments and universities may be more conscious about losing data and access to critical systems, Bitdefender telemetry reveals that the number of cyberattacks and ransomware incidents directly targeting healthcare signif]]></content:encoded></item><item><title>Who installs Zoom apps outside the Play Store? Well, lots of people.</title><description><![CDATA[


Video conferencing platform use has skyrocketed as people turn to remote work and e-learning, and Zoom has witnessed a tremendous surge in popularity. This popularity, though, has brought increased scrutiny that has revealed several issues with the platform and prompted big tech companies to ban the use of Zoom for business purposes.






https://twitter.com/MohammadFarooq_/status/1248575784656273409






We have written about fake Zoom applications floating outside the Google Play Store, a]]></description><link>https://www.bitdefender.com/en-us/blog/labs/who-installs-zoom-apps-outside-the-play-store-well-lots-of-people</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d72266</guid><category><![CDATA[Miscellaneous]]></category><dc:creator>Vlad Constantin ILIE</dc:creator><pubDate>Fri, 10 Apr 2020 14:59:46 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/wordpress/2020/04/android-android-phone-blur-close-up-544900-1.jpg" medium="image"/><content:encoded><![CDATA[


Video conferencing platform use has skyrocketed as people turn to remote work and e-learning, and Zoom has witnessed a tremendous surge in popularity. This popularity, though, has brought increased scrutiny that has revealed several issues with the platform and prompted big tech companies to ban the use of Zoom for business purposes.






https://twitter.com/MohammadFarooq_/status/1248575784656273409






We have written about fake Zoom applications floating outside the Google Play Store, a]]></content:encoded></item><item><title>Wrapping up the 2019 PwnThyBytes CTF</title><description><![CDATA[


Here we are at the end of the first edition of the PwnThyBytes Capture The Flag Competition. We hope it was a challenging, learning and intriguing experience for all teams that took part. As organizers, we can say it certainly was for us.





Without further
ado, here are the winners of the contest:





First place goes to LC↯BC, who managed to solve roughly half of the published challenges. Their efforts paid off (literally), as they receive the top prize of €2,048. Congratulations, guys!
]]></description><link>https://www.bitdefender.com/en-us/blog/labs/wrapping-up-the-2019-pwnthybytes-ctf</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d72252</guid><category><![CDATA[Miscellaneous]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Thu, 10 Oct 2019 11:00:29 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/wordpress/2019/10/ctf-awards.jpg" medium="image"/><content:encoded><![CDATA[


Here we are at the end of the first edition of the PwnThyBytes Capture The Flag Competition. We hope it was a challenging, learning and intriguing experience for all teams that took part. As organizers, we can say it certainly was for us.





Without further
ado, here are the winners of the contest:





First place goes to LC↯BC, who managed to solve roughly half of the published challenges. Their efforts paid off (literally), as they receive the top prize of €2,048. Congratulations, guys!
]]></content:encoded></item><item><title>Bitdefender is proud to announce PwnThyBytes Capture The Flag - our competitive ethical hacking contest</title><description><![CDATA[


We hope you’ve all enjoyed your summer holidays,
chilling out on the beach, seeing new places and recharging your batteries.
Because this autumn we’ve prepared the first edition of PwnThyBytes CTF, a top-notch global computer security competition,
which we hope will be a fun and challenging experience for everybody. The
contest starts on September 28th and we’re hyped to give you a sneak peek at
what to expect.





Information security competitions, such as capture the flag (CTF) contests, h]]></description><link>https://www.bitdefender.com/en-us/blog/labs/bitdefender-is-proud-to-announce-pwnthybytes-capture-the-flag-our-competitive-ethical-hacking-contest</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d72250</guid><category><![CDATA[Miscellaneous]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Tue, 17 Sep 2019 13:15:56 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/wordpress/2019/09/so-much-win.jpg" medium="image"/><content:encoded><![CDATA[


We hope you’ve all enjoyed your summer holidays,
chilling out on the beach, seeing new places and recharging your batteries.
Because this autumn we’ve prepared the first edition of PwnThyBytes CTF, a top-notch global computer security competition,
which we hope will be a fun and challenging experience for everybody. The
contest starts on September 28th and we’re hyped to give you a sneak peek at
what to expect.





Information security competitions, such as capture the flag (CTF) contests, h]]></content:encoded></item><item><title>New Homograph Phishing Attack Impersonates Bank of Valletta, Leverages Valid TLS Certificate</title><description><![CDATA[


Bitdefender researchers recently uncovered a new IDN (internationalized domain name) homograph phishing attack in which attackers impersonate the Bank of Valletta, Malta. Bitdefender’s Deep Learning technologies, trained specifically to spot this type of homograph attack, quickly flagged the website for phishing. They triggered an investigation from our teams to better understand the mechanics behind it.





Key findings:





 * Homograph phishing attack targeting a bank
 * Uses a valid TLS]]></description><link>https://www.bitdefender.com/en-us/blog/labs/new-homograph-phishing-attack-impersonates-bank-of-valletta-leverages-valid-tls-certificate</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d7224e</guid><category><![CDATA[Anti-Malware Research]]></category><category><![CDATA[Miscellaneous]]></category><dc:creator>Liviu ARSENE</dc:creator><pubDate>Wed, 07 Aug 2019 15:34:19 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/wordpress/2019/08/New_Homograph_Phishing_Attack_Impersonates_Bank_of_Valletta_Leverages_Valid_TLS_Certificate_2.png" medium="image"/><content:encoded><![CDATA[


Bitdefender researchers recently uncovered a new IDN (internationalized domain name) homograph phishing attack in which attackers impersonate the Bank of Valletta, Malta. Bitdefender’s Deep Learning technologies, trained specifically to spot this type of homograph attack, quickly flagged the website for phishing. They triggered an investigation from our teams to better understand the mechanics behind it.





Key findings:





 * Homograph phishing attack targeting a bank
 * Uses a valid TLS]]></content:encoded></item><item><title>Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction</title><description><![CDATA[Bitdefender senior researchers Dan Horea Luțaș and Andrei Vlad Luțaș recently uncovered a new speculative-execution vulnerability and demonstrated how it can be exploited via a side-channel style attack, dubbed SWAPGS Attack. The vulnerability has been publicly reported today as CVE-2019-1125.

While side-channel attacks have been known for some time now, speculative execution-based attacks are new, and signs indicate they will linger on for some time. To date, the most famous examples are Meltd]]></description><link>https://www.bitdefender.com/en-us/blog/labs/bypassing-kpti-using-the-speculative-behavior-of-the-swapgs-instruction</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d7224d</guid><category><![CDATA[Miscellaneous]]></category><category><![CDATA[Whitepapers]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Tue, 06 Aug 2019 23:37:42 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/wordpress/2019/08/jason-leung-xooz6knx1Vw-unsplash.jpg" medium="image"/><content:encoded><![CDATA[Bitdefender senior researchers Dan Horea Luțaș and Andrei Vlad Luțaș recently uncovered a new speculative-execution vulnerability and demonstrated how it can be exploited via a side-channel style attack, dubbed SWAPGS Attack. The vulnerability has been publicly reported today as CVE-2019-1125.

While side-channel attacks have been known for some time now, speculative execution-based attacks are new, and signs indicate they will linger on for some time. To date, the most famous examples are Meltd]]></content:encoded></item><item><title>GandCrab: The Most Popular Multi-Million Dollar Ransomware of the Year</title><description><![CDATA[Update February 2019: Our collaboration with the Romanian Police, Europol and other law enforcement agencies has yielded another new decryptor for all GandCrab ransomware versions released since October. If you need to decrypt versions 1, 4, 5.0.1 through 5.1, then download and run our new tool linked below.


Ransomware has been around for years and has inflicted financial losses estimated in the billions of dollars. As one of the most lucrative types of malware, from a financial perspective, r]]></description><link>https://www.bitdefender.com/en-us/blog/labs/gandcrab-the-most-popular-multi-million-dollar-ransomware-of-the-year</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d72241</guid><category><![CDATA[Miscellaneous]]></category><dc:creator>Liviu ARSENE</dc:creator><pubDate>Tue, 30 Oct 2018 13:19:11 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/wordpress/2018/10/gandcrab-the-most-popular-multi-million-dollar-ransomware-of-the-year-featured.jpg" medium="image"/><content:encoded><![CDATA[Update February 2019: Our collaboration with the Romanian Police, Europol and other law enforcement agencies has yielded another new decryptor for all GandCrab ransomware versions released since October. If you need to decrypt versions 1, 4, 5.0.1 through 5.1, then download and run our new tool linked below.


Ransomware has been around for years and has inflicted financial losses estimated in the billions of dollars. As one of the most lucrative types of malware, from a financial perspective, r]]></content:encoded></item><item><title>Bitdefender’s Business Insights Nominated at the 2018 Security Blogger Awards – Cast Your Vote!</title><description><![CDATA[Dear reader: if we had the chance, we would definitely name you the Best Corporate Security Blog Reader out there.


Now, would you vote for us as the Best Corporate Security Blog?


For the past year, we have been working hard to give you the inside scoop in cyber-security, devops and policies. Now, we give you another happy scoop: the Business Insights blog has been nominated at the 2018 Security Blogger Awards at RSA Conference in San Francisco.


Chosen by key influencers in the security lan]]></description><link>https://www.bitdefender.com/en-us/blog/labs/bitdefenders-business-insights-nominated-at-the-2018-security-blogger-awards-cast-your-vote</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d72234</guid><category><![CDATA[Miscellaneous]]></category><dc:creator>Bogdan Botezatu</dc:creator><pubDate>Fri, 30 Mar 2018 11:29:45 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/wordpress/2018/03/no-1.jpg" medium="image"/><content:encoded><![CDATA[Dear reader: if we had the chance, we would definitely name you the Best Corporate Security Blog Reader out there.


Now, would you vote for us as the Best Corporate Security Blog?


For the past year, we have been working hard to give you the inside scoop in cyber-security, devops and policies. Now, we give you another happy scoop: the Business Insights blog has been nominated at the 2018 Security Blogger Awards at RSA Conference in San Francisco.


Chosen by key influencers in the security lan]]></content:encoded></item><item><title>Ethereum OS miners targeted by SSH-based hijacker</title><description><![CDATA[The increased popularity of emerging crypto-currencies such as Monero and Ethereum has put miners once again in the bad guys’ crosshairs. Illicit digital currency mining, either directly in the browser or via maliciously-delivered miners, is nothing new, but our honeypot systems have started flagging a different type of attack against Ethereum-mining farms.


We detected the first attacks on Monday, when our SSH honeypots prompted us about a bot attempting to change the system configuration to h]]></description><link>https://www.bitdefender.com/en-us/blog/labs/ethereum-os-miners-targeted-by-ssh-based-hijacker</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d7222e</guid><category><![CDATA[Miscellaneous]]></category><dc:creator>Bogdan Botezatu</dc:creator><pubDate>Wed, 01 Nov 2017 13:17:39 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/wordpress/2017/11/bitcoin-2714192_1280.jpg" medium="image"/><content:encoded><![CDATA[The increased popularity of emerging crypto-currencies such as Monero and Ethereum has put miners once again in the bad guys’ crosshairs. Illicit digital currency mining, either directly in the browser or via maliciously-delivered miners, is nothing new, but our honeypot systems have started flagging a different type of attack against Ethereum-mining farms.


We detected the first attacks on Monday, when our SSH honeypots prompted us about a bot attempting to change the system configuration to h]]></content:encoded></item></channel>
        </rss>