Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.

Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.

How does SIM swapping work? What threat actors leverage SIM swapping? Learn what SIM swapping is and more, including how to know if it's happening to you.

In this blog, we'll address the trend of over-hyped vulnerabilities, the potential for CVSS score inflation, and how Bitsight's robust triage and prioritization engine helps CISOs and security teams cut through the noise to focus on what truly matters.

In 2024, ransomware group-operated leak sites grew by 53%. Learn about one group, Scattered Spider: who they are, what they do, recent attacks, and more.

Between 2023-2025, there was a 38% increase in CVEs. Learn which industry sectors have seen the highest levels of CVEs, & which CVEs had the highest impact.

Learn 3 ways ASM is evolving, per the 2025 KuppingerCole Leadership Compass for Attack Surface Management report, in which Bitsight was listed as a leader.

Integrated with Bitsight AI, Microsoft's Threat Intel Briefing Agent delivers relevant, contextualized, attack surface-specific intelligence in real time.

In our latest research at Bitsight TRACE, we found over 40,000 exposed cameras streaming live on the internet. No passwords. No protections. Just out there. We first raised the alarm in 2023, and based on this latest study, the situation hasn’t gotten any better.

Third-party risks and threats are dynamic, and your TPRM program should be, too. Learn the benefits of integrating cyber threat intelligence into TPRM.

What is RansomHub ransomware? We dive into the group's TTPs, latest attacks and news, & mitigation strategies you should know in 2025. Read more now.

When Spain and Portugal went dark from power outages, malware didn’t just pause. It told a story. And Bitsight caught it, live.

Remote Access Trojans (RATs) are a form of malware that grants attackers remote control over a victim’s system. Learn how RATs work & how to protect yourself.

Bitsight joined forces with Microsoft and global partners to disrupt LummaC2 — the world’s most prolific infostealer. Over 1,000 domains and 90+ criminal channels were taken down to weaken its malware infrastructure.

Compromised credentials refer to login information that's been exposed on the deep, dark web. Learn how they happen, plus detection & mitigation strategies.

Bitsight Pulse is a comprehensive, actionable threat intel news source, pulling in the latest news, events, & breaches from the deep, dark web, & OSINT sources.

Explore the 2025 State of the Underground report for an unfiltered look at cybercrime trends. Discover what 2B data points reveal about rising ransomware, breached data, and evolving underground markets—and how to stay ahead.