Bitsight TRACE: New Security Research

CISA KEV Catalog report

Bitsight TRACE: New Security Research

Bitsight TRACE research analyzing trends and insights of the Cybersecurity and Infrastructure Security Agency’s Known Exploited Vulnerabilities (KEV) Catalog. In this comprehensive report, Ben explores:

  • Prevalence of KEVs across organizations, geographies, and verticals
  • Average KEV remediation times and compliance with CISA deadlines
  • Differences in KEVs known to be part of ransomware vs other CVEs

Featured Research

Featured Research

Utilities

Featured Research

Bitsight identifies nearly 100,000 exposed industrial control systems

Bitsight has identified nearly 100,000 exposed industrial control systems (ICS) potentially allowing an attacker to access and control physical infrastructure...

Read More

Bitsight identifies nearly 100,000 exposed industrial control systems

Bitsight has identified nearly 100,000 exposed industrial control systems (ICS) potentially allowing an attacker to access and control physical infrastructure...

All Research

All Research

Data Graphs in Dark Grey Background

Malware Insights

Hunting PrivateLoader: The malware behind InstallsKey PPI service

Read the latest Bitsight research on PrivateLoader including important updates recently, including a new string encryption algorithm, a new alternative communication protocol...

Read The Report

Hunting PrivateLoader: The malware behind InstallsKey PPI service

Read the latest Bitsight research on PrivateLoader including important updates recently, including a new string encryption algorithm, a new alternative communication protocol...