Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.

Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.

Between 2023-2025, there was a 38% increase in CVEs. Learn which industry sectors have seen the highest levels of CVEs, & which CVEs had the highest impact.

Learn 3 ways ASM is evolving, per the 2025 KuppingerCole Leadership Compass for Attack Surface Management report, in which Bitsight was listed as a leader.

Integrated with Bitsight AI, Microsoft's Threat Intel Briefing Agent delivers relevant, contextualized, attack surface-specific intelligence in real time.

In our latest research at Bitsight TRACE, we found over 40,000 exposed cameras streaming live on the internet. No passwords. No protections. Just out there. We first raised the alarm in 2023, and based on this latest study, the situation hasn’t gotten any better.

Third-party risks and threats are dynamic, and your TPRM program should be, too. Learn the benefits of integrating cyber threat intelligence into TPRM.

What is RansomHub ransomware? We dive into the group's TTPs, latest attacks and news, & mitigation strategies you should know in 2025. Read more now.

When Spain and Portugal went dark from power outages, malware didn’t just pause. It told a story. And Bitsight caught it, live.

Remote Access Trojans (RATs) are a form of malware that grants attackers remote control over a victim’s system. Learn how RATs work & how to protect yourself.

Bitsight joined forces with Microsoft and global partners to disrupt LummaC2 — the world’s most prolific infostealer. Over 1,000 domains and 90+ criminal channels were taken down to weaken its malware infrastructure.

Compromised credentials refer to login information that's been exposed on the deep, dark web. Learn how they happen, plus detection & mitigation strategies.

Bitsight Pulse is a comprehensive, actionable threat intel news source, pulling in the latest news, events, & breaches from the deep, dark web, & OSINT sources.

Explore the 2025 State of the Underground report for an unfiltered look at cybercrime trends. Discover what 2B data points reveal about rising ransomware, breached data, and evolving underground markets—and how to stay ahead.

As responsibilities for cyber risk leaders grow and resources remain finite, cyber risk prioritization is vital. Learn 5 ways that CTI helps you prioritize.

As a security professional navigating the new challenges 2020 is bringing to cybersecurity, it’s critical to understand the ways your organization’s data could be exposed. Sensitive data is critical, safeguarded information. Different information can be considered sensitive depending on the industry, but in general it can be anything your organization, your employees, your customers, or your third parties would expect to be private and protected. Below, we’ve outlined five examples of sensitive data your organization likely handles—and a few key ways to protect it from evolving cyber threats.

Phases 1-2 of Bitsight's Dynamic Remediation initiative are complete. Learn how rescanning is easier & see how your score updates after taking assets offline.