Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.

Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.

In our latest research at Bitsight TRACE, we found over 40,000 exposed cameras streaming live on the internet. No passwords. No protections. Just out there. We first raised the alarm in 2023, and based on this latest study, the situation hasn’t gotten any better.

Third-party risks and threats are dynamic, and your TPRM program should be, too. Learn the benefits of integrating cyber threat intelligence into TPRM.

What is RansomHub ransomware? We dive into the group's TTPs, latest attacks and news, & mitigation strategies you should know in 2025. Read more now.

When Spain and Portugal went dark from power outages, malware didn’t just pause. It told a story. And Bitsight caught it, live.

Remote Access Trojans (RATs) are a form of malware that grants attackers remote control over a victim’s system. Learn how RATs work & how to protect yourself.

Bitsight joined forces with Microsoft and global partners to disrupt LummaC2 — the world’s most prolific infostealer. Over 1,000 domains and 90+ criminal channels were taken down to weaken its malware infrastructure.

Compromised credentials refer to login information that's been exposed on the deep, dark web. Learn how they happen, plus detection & mitigation strategies.

Bitsight Pulse is a comprehensive, actionable threat intel news source, pulling in the latest news, events, & breaches from the deep, dark web, & OSINT sources.

Explore the 2025 State of the Underground report for an unfiltered look at cybercrime trends. Discover what 2B data points reveal about rising ransomware, breached data, and evolving underground markets—and how to stay ahead.

As responsibilities for cyber risk leaders grow and resources remain finite, cyber risk prioritization is vital. Learn 5 ways that CTI helps you prioritize.

Phases 1-2 of Bitsight's Dynamic Remediation initiative are complete. Learn how rescanning is easier & see how your score updates after taking assets offline.

The 2025 Bitsight Rating Algorithm Update focuses on incorporating the Web Application Security (WAS) risk vector. Learn the research behind this change.

Vendor Risk Management is the practice of evaluating business partners, suppliers, or third-party vendors both before a business relationship is established and during the duration of your business contract. This is an important concept and practice to put in place during the evaluation of your vendors and the procurement process.

Compromised credentials fuel identity threats. Bitsight's Identity Intelligence monitors the dark web, alerts you fast, and enables rapid remediation.

AI tools like DALL-E & ChatGPT went mainstream in 2022, sparking creativity—and security concerns. Explore their impact & how threat actors may exploit them.