Bitdefender Labs' analysis of the first digital extortion by RedCurl shows that attackers aim to remain undetected for as long as possible while causing maximum damage.

Bitdefender Labs' analysis of the first digital extortion by RedCurl shows that attackers aim to remain undetected for as long as possible while causing maximum damage.
HP Wolf Security Threat Insights Report shows how cybercriminals are increasingly diversifying their attack methods to circumvent security policies and detection tools.
Security researchers from ESET have discovered a toolkit called Telekopye that even less tech-savvy people can use to commit online fraud.
Attackers are teasing would-be cyber criminals by deploying fake malware kits on code-sharing platforms like GitHub.
Christoph Buschbeck from VMware explains how companies protect their networks and data in a multi-cloud world.