u/Bitdefender_

DAEMON Tools Lite breach

DAEMON Tools Lite breach

Installed DAEMON Tools Lite 12.5.1 recently? The company says some official installers were tampered with in a supply chain attack. See what happened and what to do next. 🔗

bitdefender.com
u/Bitdefender_ — 23 hours ago

What’s New in GravityZone May 2026 (v 6.73)

Security analysts and IT administrators are being asked to do more with less, so this month’s GravityZone updates are focused on improving visibility, reducing friction, and simplifying day-to-day operations.

What’s new in GravityZone May 2026:

↪︎ PHASR mapped directly to MITRE ATT&CK;
↪︎ Expanded Windows raw event coverage for EDR/XDR investigations;
↪︎ Simplified MSP onboarding workflows;
↪︎ Unified workstation/server licensing;
↪︎ New ransomware reporting visibility;
↪︎ API and policy management enhancements.

Whether you’re investigating threats or managing endpoints at scale, these updates are designed to help teams move faster and operate more efficiently.

Which update would have the biggest operational impact for your team?

bitdefender.com
u/Bitdefender_ — 2 days ago

Modern email attacks don’t stop at delivery. BEC, impersonation, and delayed payload activation are increasingly designed to evade traditional SEG-only defenses.

That’s why we introduced Bitdefender GravityZone Extended Email Security, combining gateway protection, API-based inspection, post-delivery analysis, and automated remediation in a single platform.

Highlights:
↪︎ Continuous Microsoft 365 mailbox monitoring
↪︎ Auto-remediation for malicious links and payloads
↪︎ Live Email Tracker for investigation and forensics
↪︎ Unified multi-tenant visibility built for MSP workflows

For MSPs, reducing tool sprawl while maintaining visibility across customer environments is becoming critical as email threats evolve.

If you're an MSP, how are you handling post-delivery email threats today?

u/Bitdefender_ — 7 days ago

Each month we break down what’s actually happening in the ransomware landscape: who’s active, who’s getting hit, and what’s changing: https://bitdefend.me/4cQVLT7

Join us live on Thursday, May 14, for a walkthrough of key insights from the latest Bitdefender Threat Debrief. We’ll cover:

  • Leading ransomware groups
  • Most affected industries and regions
  • Notable developments and trends

This is a discussion, not a lecture. Questions and perspectives are welcome.

If there are specific angles or questions you’d like to see addressed in future sessions, please share them with us.

Attend live here: https://bitdefend.me/4cQVLT7

u/Bitdefender_ — 9 days ago

Proxies and VPNs can look similar because both can hide your IP address. But they do not offer the same level of protection. Learn the key differences and which option is safer.

u/Bitdefender_ — 15 days ago

https://preview.redd.it/6nufchrzqwxg1.png?width=1080&format=png&auto=webp&s=3033df7a4adebcded5fb6b3cc6f805ff3135a041

When sovereignty gets treated as a box to tick, the risk doesn’t go away: it tends to resurface in architecture choices and third-party dependencies.

Our VP of Products sat down with OVHcloud’s CISO to talk through how this actually plays out in real environments, from cloud design trade-offs to incident response.

Sharing it here if you’re dealing with similar questions:

Full session: https://bitdefend.me/4cBOarx

reddit.com
u/Bitdefender_ — 16 days ago

Meta warned about a targeted spyware campaign that used a counterfeit WhatsApp app, not a hack of WhatsApp itself. Victims were tricked into installing the fake version outside official app stores. Learn more: https://bitdefend.me/4cQs97c

u/Bitdefender_ — 17 days ago