Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.

Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.

How does SIM swapping work? What threat actors leverage SIM swapping? Learn what SIM swapping is and more, including how to know if it's happening to you.

In 2024, ransomware group-operated leak sites grew by 53%. Learn about one group, Scattered Spider: who they are, what they do, recent attacks, and more.

Third-party risks and threats are dynamic, and your TPRM program should be, too. Learn the benefits of integrating cyber threat intelligence into TPRM.

Compromised credentials refer to login information that's been exposed on the deep, dark web. Learn how they happen, plus detection & mitigation strategies.

As responsibilities for cyber risk leaders grow and resources remain finite, cyber risk prioritization is vital. Learn 5 ways that CTI helps you prioritize.

Compromised credentials fuel identity threats. Bitsight's Identity Intelligence monitors the dark web, alerts you fast, and enables rapid remediation.

AI tools like DALL-E & ChatGPT went mainstream in 2022, sparking creativity—and security concerns. Explore their impact & how threat actors may exploit them.

Stealer malware (infostealer) is growing as a top avenue for identify credential theft. Learn what stealer malware is, how it works, & how to safeguard data.

APTs stand in stark contrast with most of the deep and dark web’s users, but they do exist. Learn 5 functions and examples of APTs on the deep, dark web.

Bitsight CEO, Steve Harvey, is thrilled to announce the official closing of Bitsight’s acquisition of Cybersixgill, a leading provider of cyber threat intelligence solutions. Read the full announcement.

Phishing kits are easy to access on the cyber underground, making attacks simpler than ever. Learn how these tools work and how to defend against them.

By being aware of the pitfalls & embracing best practices for threat intelligence programs, organizations can achieve both cybersecurity & business goals.

AI is reshaping threat intelligence, redefining how we gather and analyze data. Explore the rise of AI-driven threat intelligence and its security impact.

Doxing, once a gaming tactic, now targets public figures. After the Dobbs ruling, 5 Supreme Court justices were doxed. Learn how it happens & how to stay safe.

Balancing data flow & security is crucial as file sharing grows. Learn how file hosting services help protect digital assets while enabling access.