Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Bitsight GIA Update: How Gen-AI and LLMs Get You Faster (and Better) Entity Mapping

Bitsight’s mission to keep evolving the capability of our data engine through AI enhancements hit a new milestone today. The latest addition is a new entity mapping capability added to Bitsight AI and the data engine, which uses GenAI agents to create more complete and consistent sets of identifiers for organizations scanned and added to Bitsight’s entity inventory.

AsyncRAT in Action: Fileless Malware Techniques and Analysis of a Remote Access Trojan

Fileless malware continues to evade modern defenses due to its stealthy nature and reliance on legitimate system tools for execution. This approach bypasses traditional disk-based detection by operating in memory, making these threats harder to detect, analyze, and eradicate. A recent incident culminated in the deployment of AsyncRAT, a powerful Remote Access Trojan (RAT), through a multi-stage fileless loader. In this blog, we share some of the key takeaways from this investigation.

Girona FC Kicks Off Security Partnership with WatchGuard

In an era where professional sports organizations increasingly rely on digital infrastructure, the risks associated with cyber threats are greater than ever. Girona FC, one of LaLiga’s rising professional football clubs, has taken a significant step to enhance its cybersecurity posture by partnering with WatchGuard Technologies. This move reflects the Club’s broader commitment to digital resilience and operational security.

Unpacking the Recent npm Supply Chain Attack: What We Know So Far

The software supply chain has once again come under fire, with npm — the world’s largest package ecosystem — at the center of one of the most significant compromises to date. Recent findings suggest that attackers successfully hijacked a maintainer account through phishing, injecting malicious code into popular open-source packages with billions of weekly downloads.

Why Is Detecting Insider Threats So Hard-And How Can You Stay Ahead?

Insider threats come from people who already possess legitimate access—employees, contractors, partners. You cannot treat these risks like typical external attacks because insiders operate inside trust boundaries, with valid credentials and normal workflows. When you lack real-time, contextual detection, insider activity progresses quietly. You see isolated events—an odd file download, an unusual login from a different location—without the timeline that shows intent.

Why CIOs and CISOs Must Be Business Leaders First

In today’s climate, where every company is a technology company, there is a simple truth many still overlook: CIOs and CISOs can no longer afford to see themselves primarily as technologists or risk gatekeepers. The mandate is clear: They must be business leaders first, using technology and cybersecurity expertise as powerful tools to drive growth, trust, and competitive advantage.

How to Navigate Stablecoin Compliance: KYC, Travel Rule, Transaction Monitoring

Whether you’re building global payout corridors or embedding stablecoin rails into treasury operations, stablecoin compliance is what turns innovation into scale. It’s the reason your banking partners stay comfortable, your regulators stay satisfied, and your operations keep running 24/7, across borders, without fail. The fastest-scaling firms aren’t treating KYC, the Travel Rule, and on-chain transaction monitoring as afterthoughts.

Times are Changing. How to Future-Proof Your Cybersecurity Career.

Since the floodgates opened in November 2022 (at the arrival of ChatGPT), there has been one question on everyone’s mind: Is AI going to take my job? While the answers range from yes to no to maybe, there are ways to ride the AI wave without being subsumed by it. The way skilled professionals will do that, especially within cybersecurity, all depends on how well they know the industry—and how well they understand the value of their place in it.

The Great NPM Heist - September 2025

On September 8, 2025, the JavaScript ecosystem experienced what is now considered the largest supply chain attack in npm history. A sophisticated phishing campaign led to the compromise of a trusted maintainer’s account, resulting in the injection of cryptocurrency-stealing malware into 18+ foundational npm packages. These packages collectively accounted for over 2 billion weekly downloads, affecting millions of applications globally—from personal projects to enterprise-grade systems.

Multiple Login & Access Solutions for Headless Shopify Stores

Discover how to simplify and secure authentication for Shopify Hydrogen storefronts. Learn how single sign-on (SSO), social login, restricted content access, and multi-store sync can deliver a unified, user-friendly experience, powered by miniOrange’s scalable authentication solutions.