
DAEMON Tools Lite breach
Installed DAEMON Tools Lite 12.5.1 recently? The company says some official installers were tampered with in a supply chain attack. See what happened and what to do next. 🔗

Installed DAEMON Tools Lite 12.5.1 recently? The company says some official installers were tampered with in a supply chain attack. See what happened and what to do next. 🔗
Security analysts and IT administrators are being asked to do more with less, so this month’s GravityZone updates are focused on improving visibility, reducing friction, and simplifying day-to-day operations.
What’s new in GravityZone May 2026:
↪︎ PHASR mapped directly to MITRE ATT&CK;
↪︎ Expanded Windows raw event coverage for EDR/XDR investigations;
↪︎ Simplified MSP onboarding workflows;
↪︎ Unified workstation/server licensing;
↪︎ New ransomware reporting visibility;
↪︎ API and policy management enhancements.
Whether you’re investigating threats or managing endpoints at scale, these updates are designed to help teams move faster and operate more efficiently.
Which update would have the biggest operational impact for your team?
Modern email attacks don’t stop at delivery. BEC, impersonation, and delayed payload activation are increasingly designed to evade traditional SEG-only defenses.
That’s why we introduced Bitdefender GravityZone Extended Email Security, combining gateway protection, API-based inspection, post-delivery analysis, and automated remediation in a single platform.
Highlights:
↪︎ Continuous Microsoft 365 mailbox monitoring
↪︎ Auto-remediation for malicious links and payloads
↪︎ Live Email Tracker for investigation and forensics
↪︎ Unified multi-tenant visibility built for MSP workflows
For MSPs, reducing tool sprawl while maintaining visibility across customer environments is becoming critical as email threats evolve.
If you're an MSP, how are you handling post-delivery email threats today?
Fake toll and parking texts are spreading. See how to spot them and avoid malware.
Each month we break down what’s actually happening in the ransomware landscape: who’s active, who’s getting hit, and what’s changing: https://bitdefend.me/4cQVLT7
Join us live on Thursday, May 14, for a walkthrough of key insights from the latest Bitdefender Threat Debrief. We’ll cover:
This is a discussion, not a lecture. Questions and perspectives are welcome.
If there are specific angles or questions you’d like to see addressed in future sessions, please share them with us.
Attend live here: https://bitdefend.me/4cQVLT7
Bitdefender joined the Family Online Safety Institute to help families navigate online risks in the age of AI. Learn more: https://bitdefend.me/4uESYCL
Proxies and VPNs can look similar because both can hide your IP address. But they do not offer the same level of protection. Learn the key differences and which option is safer.
When sovereignty gets treated as a box to tick, the risk doesn’t go away: it tends to resurface in architecture choices and third-party dependencies.
Our VP of Products sat down with OVHcloud’s CISO to talk through how this actually plays out in real environments, from cloud design trade-offs to incident response.
Sharing it here if you’re dealing with similar questions:
Full session: https://bitdefend.me/4cBOarx
Meta warned about a targeted spyware campaign that used a counterfeit WhatsApp app, not a hack of WhatsApp itself. Victims were tricked into installing the fake version outside official app stores. Learn more: https://bitdefend.me/4cQs97c