Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

New Cybersecurity Executive Order Redraws Priorities: What It Means for AI, Digital IDs, and Supply Chain Security

As the global cyber threat landscape continues to evolve, the latest cybersecurity executive order from the Trump administration is making waves—setting new priorities while reversing some of the cornerstone initiatives from previous administrations. The new directive pivots away from centralized federal control and compliance-heavy practices, placing a sharper focus on AI innovation, post-quantum cryptography, and software security by design.

Stealth Cyberattacks at Night: How Librarian Ghouls Are Exploiting Trusted Tools to Evade Detection

The cyber threat landscape is rapidly evolving. Among the most recent and concerning trends is the use of stealth attacks that bypass traditional defenses by abusing legitimate tools. One such campaign, led by a group called Librarian Ghouls, is targeting organizations across Russia with cleverly disguised phishing emails, cryptominers, and remote-access software—often operating undetected in the middle of the night.

OT Security Lessons from the Trenches: Patterns and Pitfalls from BACS Assessments

The convergence of Building Automation and Control Systems (BACS) and smart building innovation within operational technology (OT) is helping to drive technological and environmental advances. However, it is also contributing to the emergence of significant security vulnerabilities and threats.

Phone Cloning: How Hackers Copy Your Phone and How You Can Protect Yourself

Cell phone cloning was first recorded in the 1990s when analog phone networks were common. During this period, malicious actors exploited vulnerabilities in the analog system to clone phones and access services while avoiding any charges. However, with technological advancements, phone cloning techniques have also adapted and become more sinister. Fraudsters now exploit vulnerabilities in mobile device software and security systems, enabling them to clone a phone remotely without needing physical access.

Unified Security: Bridging the Gaps with a Defense-in-Depth Approach

The identity is the main attack vector for cybercriminals, with cybercriminals using stolen identity to infiltrate the organization, move laterally and vertically throughout the organization, and extract data, deploy ransomware, establish backdoors, and cause major service disruptions. All with long term impact to organizations.

Automate Cloud SIEM investigations with Bits AI Security Analyst

Security analysts face unprecedented challenges in today's cloud landscape. Security operations center (SOC) teams are chronically understaffed, and cybersecurity threats are skyrocketing—further intensified by GenAI-driven attacks. High false positive rates add to this strain, fueling alert fatigue and delaying the detection of real threats. These hurdles make it harder for analysts to keep pace, which ultimately drives up mean time to resolution (MTTR).

Bitsight Identifies Thousands of Security Cameras Openly Accessible on the Internet

Welcome to 2025, where thousands of internet-connected cameras meant to protect us are actually putting us at risk. In our latest research at Bitsight TRACE, we found over 40,000 exposed cameras streaming live on the internet. No passwords. No protections. Just out there. We first raised the alarm in 2023, and based on this latest study, the situation hasn’t gotten any better.

The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase

MCP adoption is surging across industries, fundamentally reshaping how systems connect to AI models. By establishing a universal protocol for data exchange, MCP simplifies integration complexity, empowering developers to build sophisticated AI capabilities in a fraction of the traditional development time. However, this streamlined connectivity to AI tools introduces significant security risks.

SecOps Automation: How Lean Teams Can Achieve Enterprise-Level Security

The modern threat landscape doesn’t scale down just because your team is lean. Whether you’re a two-person SecOps crew or a full-blown SOC, attackers don’t discriminate — and the alerts don’t stop. Small security teams face the same phishing, ransomware, and insider threats as the world’s largest enterprises — only with fewer hands on deck and less time to respond. To level the playing field, teams are turning to SecOps automation.

Cloud Security Must Be a Pillar of Your Exposure Management Strategy

When it comes to exposure management at any organization, it’s natural to focus on vulnerability management and application security. They’ve been core parts of security programs for years; scanning infrastructure, fixing bugs, tightening code. But if cloud security isn’t part of the conversation too, you’re leaving critical risks uncovered.