welcome to

Industry Reports

Bitdefender - Hacked Off!

Bitdefender - Hacked Off!

Introducing Bitdefender Hacked Off! A comprehensive study into the cybersecurity attitudes of infosecurity professionals around the world.

READ MORE

Petya Ransomware Goes Low Level: Analysis and Full Details on Bitdefender's Vaccine Preventing File Encryption

Petya Ransomware Goes Low Level: Analysis and Full Details on Bitdefender's Vaccine Preventing File Encryption

The new Petya ransomware seems to have been built with speed in mind, as to expedite the encryption process. While traditional ransomware encrypts files one by one, Petya encrypts the location containing all information about disk files, such as size, permissions, and data content, essentially preventing users from accessing all their data.

Bitdefender was able to analyze the Petya ransomware and offer potential victims a tool that intercepts the encryption process and offers the decryption key, free of charge. Most importantly, the tool needs to be installed prior to being infected - not afterwards – in order to perform its function correctly.

READ MORE

Android Ransomware and SMS-Sending Trojans Remain a Growing Threat - Android Malware Threat Report H2 2015

Android Ransomware and SMS-Sending Trojans Remain a Growing Threat - Android Malware Threat Report H2 2015

Ransomware has been plaguing Windows PC for the past couple of years, but recently it seems to have developed platform-agnostic capabilities and has moved towards Linux and Android.

While not yet as advanced as its Windows counterpart, Android ransomware can still cause massive headaches, disruptions and financial losses. Bitdefender Android telemetry shows the Android.Trojan.Slocker ransomware family ranked first in UK, German and Australian charts, based on the number of devices that reported it.

Android ransomware could be considered more important than it's PC counterpart because mobile devices have access to and store a lot of personal and even corporate data that's usually not backed up. Losing that data or simply being denied access to it could be irreversible and users would be far more inclined to pay to recover their contacts, conversations, pictures and documents.

READ MORE

APT28 Under the Scope: A Journey into Exfiltrating Intelligence and Government Information

APT28 Under the Scope: A Journey into Exfiltrating Intelligence and Government Information

The discovery of Stuxnet in the nuclear processing plant in Natanz, Iran laid the ground for a new family of cyber-attacks: advanced persistent threats. Although the term has since become highly popular, state-sponsored cyber-intelligence operations have been carried out since long before the advent of Stuxnet or Flamer; less known advanced persistent threats such as APT28 (or Sofacy) have been covertly running in Europe since 2007.





To connect the dots between an identified attack and the state actor(s) behind it, companies like Bitdefender look for solid evidence inside the APT code or in the used communication infrastructure. The following report is a technical investigation of some particularities in the APT28 payload implementation that allowed us to link the threat to its operators.

READ MORE

HIPAA compliance: what you need to know about security for virtualization and cloud environments

HIPAA compliance: what you need to know about security for virtualization and cloud environments

This eGuide provides an overview of HIPAA and the challenges it presents to healthcare and other related industries, the impact the legislation is having on several technology areas, and how trends such as cloud and mobility may impact compliance efforts.

READ MORE

Newest Data Center Dilemma: Security vs. Performance

Newest Data Center Dilemma: Security vs. Performance

This Executive Brief, written by CIO Insight and sponsored by Bitdefender, explains how traditional security solutions can undermine the benefits of virtualization, and how you can address this challenge.

READ MORE