Towards a Universal Security Solution against Bluetooth Low Energy Attacks

For the past couple of years, Bluetooth has become the de-facto standard in low-range communication, with a particular impact on smart home and IoT development. From smart speakers to smart lights and everything in between, Bluetooth makes connectivity… Continue reading Towards a Universal Security Solution against Bluetooth Low Energy Attacks

Shade / Troldesh Ransomware decryption tool

We have just released an updated decryption tool for Shade (Troldesh) Ransomware. As a long-established family of ransomware, Shade has been in operation since 2014, and has been operating consistently ever since. In late April 2020, its operators anno… Continue reading Shade / Troldesh Ransomware decryption tool

Paradise Ransomware decryption tool

We’re happy to announce a new decryptor for Paradise Ransomware. Paradise Ransomware, initially spotted in 2017, has been aggressively marketed as a service to interested affiliates. After infection, it checks whether the keyboard language is set… Continue reading Paradise Ransomware decryption tool

Multiple Vulnerabilities in Belkin WeMo Insight Switch

Internet of Things devices have become commonplace in modern homes. Relatively inexpensive and easy to control remotely, they promise a world at your fingertips. Security vulnerabilities in connected devices can not only affect the user experience but … Continue reading Multiple Vulnerabilities in Belkin WeMo Insight Switch

Bitdefender is proud to announce PwnThyBytes Capture The Flag – our competitive ethical hacking contest

We hope you’ve all enjoyed your summer holidays, chilling out on the beach, seeing new places and recharging your batteries. Because this autumn we’ve prepared the first edition of PwnThyBytes CTF, a top-notch global computer security compe… Continue reading Bitdefender is proud to announce PwnThyBytes Capture The Flag – our competitive ethical hacking contest

Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction

Bitdefender senior researchers Dan Horea Luțaș and Andrei Vlad Luțaș recently uncovered a new speculative-execution vulnerability and demonstrated how it can be exploited via a side-channel style attack, dubbed SWAPGS Attack. The vu… Continue reading Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction

IoT Report: Major Flaws in Guardzilla Cameras Allow Remote Hijack of the Security Device

Vulnerabilities in indoor security camera allows remote compromise and device takeover The commodification of IoT devices has paved the way to the smart home. Interconnected appliances, intelligent assistants and smart home surveillance are just some a… Continue reading IoT Report: Major Flaws in Guardzilla Cameras Allow Remote Hijack of the Security Device