Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.

Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.

Vulnerability intelligence is the continuous monitoring, analysis, & prioritization of vulnerabilities based on real-world threat activity. Learn more.

Dark web monitoring provides real-time insights on threats, vulnerabilities, and leaked data to help organizations stay ahead of cyber risks. Learn more now.

If you’re considering a new cyber threat intelligence product, here are three steps to take that should help you make the right choice for your organization.

Dark web forums serve as hubs for various discussions, from cybersecurity to privacy to hacking.
But how many users are active on these forums? Learn more now.
But how many users are active on these forums? Learn more now.

Leaked & compromised credentials pose serious cybersecurity risks. Learn how they happen, how attackers exploit them, and how to prevent credential exposure.

Bitsight CEO, Steve Harvey, is thrilled to announce the official closing of Bitsight’s acquisition of Cybersixgill, a leading provider of cyber threat intelligence solutions. Read the full announcement.

Phishing kits are easy to access on the cyber underground, making attacks simpler than ever. Learn how these tools work and how to defend against them.

By being aware of the pitfalls & embracing best practices for threat intelligence programs, organizations can achieve both cybersecurity & business goals.

AI is reshaping threat intelligence, redefining how we gather and analyze data. Explore the rise of AI-driven threat intelligence and its security impact.

AI tools like DALL-E & ChatGPT went mainstream in 2022, sparking creativity—and security concerns. Explore their impact & how threat actors may exploit them.

Doxing, once a gaming tactic, now targets public figures. After the Dobbs ruling, 5 Supreme Court justices were doxed. Learn how it happens & how to stay safe.

Balancing data flow & security is crucial as file sharing grows. Learn how file hosting services help protect digital assets while enabling access.

On the cyber underground, threat actors seek to profit fraudulently from the e-commerce boom. In particular, a tactic called refunding is growing in popularity.

Dive into the SANS CTI Survey 2024 to find out why threat hunting is now the top CTI use case, and the rise of CTI reports importance. Read more now.