Explore expert perspectives, data-driven strategies, and the latest trends in cybersecurity, third-party risk management, and cyber threat intel — all from the leader in cyber risk intelligence.
Blog

Your company’s brand no longer lives solely on billboards, commercials, or your own website. It’s scattered across social media platforms, email inboxes, mobile apps, and search results. And unfortunately, that ubiquity makes it a prime target for cybercriminals.

We’re embedding AI across our integrated cyber risk intelligence platform—from summarizing threat intelligence to parsing SOC 2 reports, mapping vendor documents to compliance frameworks, and powering dynamic vulnerability scoring.

New SonicWall SMA100 vulnerabilities (CVE-2025-40596 to CVE-2025-40599) could enable remote code execution—even on patched devices. While Akira ransomware activity has surged, exploitation remains unconfirmed. Learn why immediate patching, MFA, and access controls are critical now.

Bitsight has launched Framework Intelligence—an AI-powered automation and orchestration that integrates cyber risk intelligence into security frameworks to help protect data and systems from rapidly evolving threats.

Anubis is a relatively recent addition to the ransomware ecosystem, first identified in November 2024. Despite its short time in operation, the group has established a notable presence, particularly through its attacks on critical infrastructure.

In The State of Cyber Risk and Exposure 2025 report, learn why nearly 90% of risk leaders in the UK say managing cyber risk is harder today than 5 years ago.

In The State of Cyber Risk and Exposure 2025 report, learn why 9 in 10 cybersecurity leaders said that managing cyber risk is harder today than 5 years ago.

What is ToxicPanda? Bitsight Trace dives into detail on the banking malware, from impact breadth, delivery, technical analysis, and more. Learn more now.

Bitsight's overview of critical SharePoint RCE zero-days CVE-2025-53770 & CVE-2025-53771, active exploitation & impact, with essential mitigation recommendations.

Acreed, a new MaaS platform, appears to have taken the top spot in the infostealer ecosystem, uploading over 4,000 credential logs to the dark web in its first week.

Uncover hidden AI risks in your extended supply chain—see how Bitsight Continuous Monitoring reveals and prioritizes fourth-party AI dependencies so you can act with confidence.

This report details an investigation into a Fast Flux network observed in 2024. It covers the technical details of the network, its observable infrastructure, the malware associated with it, and its presence on the dark web.

How does SIM swapping work? What threat actors leverage SIM swapping? Learn what SIM swapping is and more, including how to know if it's happening to you.

In this blog, we'll address the trend of over-hyped vulnerabilities, the potential for CVSS score inflation, and how Bitsight's robust triage and prioritization engine helps CISOs and security teams cut through the noise to focus on what truly matters.

In 2024, ransomware group-operated leak sites grew by 53%. Learn about one group, Scattered Spider: who they are, what they do, recent attacks, and more.