Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Bitdefender

Below you will find reports with the source of “Bitdefender”

image from Looking Into the Eye of the Interplanetary Storm

Looking Into the Eye of the Interplanetary Storm

This article offers a glimpse into the inner workings of the Interplanetary Storm botnet, provides an exhaustive technical analysis of the Golang-written binaries along with an overview of the protocol internals and finally, some attribution information.

(more available)
Added: October 18, 2020
image from 10 in 10 Report 2020

10 in 10 Report 2020

This report looks at the 10 most impactful factors in cybersecurity success for the next decade.

Added: September 27, 2020
image from More Evidence of APT Hackers-for-Hire Used for Industrial Espionage

More Evidence of APT Hackers-for-Hire Used for Industrial Espionage

Bitdefender researchers recently investigated a sophisticated APT-style cyberespionage attack targeting aninternational architectural and video production company, pointing to an advanced threat actor and a South Korean based C&C infrastructure. This report goes in-depth on this attack.

(more available)
Added: September 1, 2020
image from Dissecting the APT28 Mac OS X Payload

Dissecting the APT28 Mac OS X Payload

This report analyzes the Mac specific malware from APT28 named Trojan.MAC.APT28

Added: November 12, 2018
image from Inexsmar: An unusual DarkHotel campaign

Inexsmar: An unusual DarkHotel campaign

The DarkHotel attack Inexsmar from 2016 has striking similarities to attacks from as early as 2011. Inexsmar is also focusing on political targets rather than the group’s normal choice of senior corporate officials, corporate research, and development personnel.

(more available)
Added: November 12, 2018
image from Virtualization's Hidden Traps

Virtualization's Hidden Traps

This study explores the pressures cloud migration place on 1,051 IT security professionals from large enterprises with 1,000+ PCs and data centers, based in the US, the UK, France, Italy, Sweden, Denmark, and Germany.

(more available)
Added: October 22, 2018
image from Virtualization Makes CIOs Role Key

Virtualization Makes CIOs Role Key

An October 2016 Bitdefender survey of 250 IT decision makers in the United States in companies with more than 1,000 PCs, shows they will rise in companies’ hierarchies, as CEOs and board members face increasing internal and external security risks that could ruin customer trust and business forecasts. Still, not all C-suites include CIOs/CISOs in the business decision-making process. This survey, carried out by iSense Solutions, shows how IT decision makers perceive their role inside the organizations and what they need to meet shareholder expectations. How has virtualization changed the security game? How many attacks can be stopped with the current resources? Would they pay to avoid public shaming?

(more available)
Added: October 21, 2018
image from The 2017 Global Threat Landscape Report

The 2017 Global Threat Landscape Report

“This report is based exclusively on information collected via a wide range of security services within GravityZone: Security for Virtualized Environments, Security for Endpoints, Security for Mobile and Security for Exchange, consumer-oriented products such as Bitdefender Antivirus, Bitdefender Internet Security or Bitdefender Total Security, as well as from Bitdefender BOX, the innovative solution for protecting devices in the IoT space.”

(more available)
Added: October 20, 2018
image from The Emotional Side of Virtualization

The Emotional Side of Virtualization

Virtualization is a strategic priority at large companies, and trust plays a crucial role in their choice of cloud service provider and in determining the type of data they store outside company infrastructure, according to a Bitdefender survey of 503 IT decision makers at companies in the US, the UK and Germany with more than 1,000 PCs. Hybrid infrastructures, a mix of public cloud services and privately owned data centers, have become the major architecture in the enterprise environment, and CIOs have to adapt to the new world. This survey, carried out by iSense Solutions, reveals why companies virtualize, which countries CIOs trust and what kind of data companies care most about.

(more available)
Added: October 19, 2018
image from 2017 Bitdefender Ransomware Reprot

2017 Bitdefender Ransomware Reprot

This is a solid breakdown of the Ransomware issues as seen in 2017.

Added: October 18, 2018
image from Ransomware: A Victims perspective

Ransomware: A Victims perspective

This paper seeks to answer the following questions, “What motivates victims to pay up? How much do they value their data? What role does antivirus protection play in the problem-solving equation?"

(more available)
Added: October 17, 2018
image from Delivering Strong Security In A HyperConverged Data Center Environment

Delivering Strong Security In A HyperConverged Data Center Environment

From The Report, “Just as hyperconvergence in the data center will have a huge impact on how systems and data are managed, it will have significant repercussions for information security. Any organization that thinks security does not need to change in a hyperconverged environment puts data and systems reliability at risk.”

(more available)
Added: October 16, 2018
© Cyentia Institute 2025
Library updated: July 6, 2025 20:08 UTC (build b1d7be4)