Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.

Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.

What is RansomHub ransomware? We dive into the group's TTPs, latest attacks and news, & mitigation strategies you should know in 2025. Read more now.

Remote Access Trojans (RATs) are a form of malware that grants attackers remote control over a victim’s system. Learn how RATs work & how to protect yourself.

It’s every security manager's worst nightmare. A member of the IT department reaches to alert that malicious software has been detected on an internal network, and the hacker potentially has access to layers of sensitive data. In the following days and weeks of remediation, locating an access point, and reinforcing cybersecurity measures, security managers often ask themselves, “could this data leak have been prevented?”

The threat of ransomware has been increasingly prevalent, especially within the high-stakes industries like healthcare and those involved in the election.

Malware can gain entry to your network in many ways. Once malware has penetrated a network, threat actors can use it to steal information, encrypt systems, spy on users, and remove files. Learn how to prevent dangerous malware.

In 2021, ransomware attacks on government agencies globally increased by 1,885% over 2020 attacks, and the trends are continuing so far in 2022. Learn how to protect your organization from ransomware with three best practices.

Learn about the top ransomware attack vectors favored by hackers and the steps you can take to protect your organization.

Our response to CVEs within the CUPS printing system, where several critical vulnerabilities were identified.

What is cyber resilience vs. cybersecurity and why in today’s digital economy you need a plan for both.

Want to capture your board’s attention? Add these seven KPIs to your cybersecurity dashboard.

Dive into a significant cybersecurity scare that could have led to widespread chaos, highlighting the vulnerabilities that were exposed and the swift actions taken to prevent disaster.

Email is a well-known and widely used attack vector for malware distribution, phishing, and many other types of threats.

Discover why millions of smartphones worldwide are at risk due to cluttered and outdated apps. Dive into our research to learn more about this critical issue.

The attack surface encompasses the digital assets that a hacker can exploit. An attack vector is the method they use to breach the attack surface.

We’re back again with a monthly-ish blog reflecting on major goings on in the security world.