Bitdefender first documented the Curly COMrades threat actor, operating to support Russian interests in geopolitical hotbeds, in August 2025. Since that initial discovery, subsequent forensics and incident response efforts have revealed critical new tools and techniques. Valuable support was provided by the Georgian CERT, whose collaboration significantly advanced the investigation. It alerted us to a detected sample communicating with a compromised site we were monitoring, enabling a joint analysis. The Georgian CERT was then instrumental in evidence acquisition and conducting a forensic analysis of the compromised site itself, which the attackers leveraged as a proxy to their actual ...
The Voice of Cyber®
Threat Intelligence
Threat Intelligence is a cornerstone of effective cybersecurity involving the collection, analysis, and dissemination of information about potential cyber threats to inform decision-making and enhance an organisation’s security posture. Threat intelligence encompasses data on emerging vulnerabilities, attack techniques, and the tactics employed by threat actors.
Newest Release
No results found.
Deep Dive Articles
Sort By
- Date
- Title

MITRE, the cornerstone of global vulnerability tracking, announcing it could go dark. For years, the field had relied on this single repository, the bedrock for tracking ...

Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role and function. Contrary to popular belief they don’t ...
This article shares initial findings from internal Bitdefender Labs research into Living off the Land (LOTL) techniques. Our team at Bitdefender Labs, comprised of hundreds ...
Bitdefender researchers have uncovered a surge in subscription scams, both in scale and sophistication, spurred by a massive campaign involving hundreds of fraudulent ...

DeepSeek, the tool designed to exploit vulnerabilities in AI systems, raises significant concerns amongst the security industry, particularly OpenAI. The DeepSeek competitor ...
In 2024 and continuing into 2025, social media platforms were prime targets for cybercriminals, with content creators facing the brunt of the malicious attacks, including a ...
No results found.
In The News
Sort By
- Date
- Title
From AI fragmentation and identity debt to biological computing, BeyondTrust forecasts the technologies and threats that will shape the next decade. | Experts predict a surge ...
Bitdefender today released new joint research with NETGEAR titled the 2025 IoT Security Landscape Report, providing a comprehensive analysis of the growing threats targeting ...
Nozomi Networks Inc., the leader in OT, IoT and CPS security today announced the industry’s first cybersecurity solution to safely automate threat responses in operational ...
New Cyber Intelligence Reveals ‘Internet Tsunami’ Attacks and Rising Automation in Global Attacks
Ransomware readiness lags as adversaries use AI across the attack chain to accelerate intrusion, encryption, and extortion
Infoblox Threat Intel (ITI), together with the United Nations Office on Drugs and Crime (UNODC), has linked BBIN aka Baoying Group, one of Asia’s largest iGaming providers, ...
No results found.
Podcasts On Threat Intelligence




