Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Match Made in Heaven: How Valentine's Day Fuels Seasonal Phishing Attacks

Valentine’s Day runs on emotion. Surprise, urgency, curiosity, trust, love. For threat actors, that combination is hard to beat. Every year in mid-February, security teams see the same pattern. Phishing campaigns pick up. Brand impersonation increases. Fraud attempts follow close behind. It is not because attackers suddenly developed new techniques.

Dark Web Intelligence for Supply Chains: From Reactive TPRM to Threat-Led Defense

Modern cyberattacks rarely start where defenders are looking. Instead of targeting the enterprise head-on, attackers increasingly move through sprawling ecosystems of vendors, suppliers, and partners, exploiting trust relationships, weak controls, and delayed visibility.

Automating Cybersecurity Governance: How Bitsight Is Expanding AI-Powered Workflows Across SPM and VRM

Security governance was never meant to be this manual. Yet for most security and third-party risk teams, governance work still means reviewing documents line by line, mapping controls by hand, interpreting evidence subjectively, and repeating the same processes across internal teams, subsidiaries, and vendors. These activities are critical, but they’re also slow, inconsistent, and difficult to scale. At Bitsight, we believe cybersecurity governance should move at the speed of risk.

Cyber Risk in 2026: From Today's Pressures to Tomorrow's Threats

As we enter 2026, security and risk leaders are navigating a landscape that is both increasingly complex and strikingly familiar. At Bitsight, we have spent the last year listening to our customers, synthesizing insights from the field, and preparing for what lies ahead. In a recent webinar with my colleague Vanessa Jankowski, we explored the forces shaping cyber risk in the year to come.

Critical Vulnerability Alert: CVE-2025-40551 in SolarWinds Web Help Desk

A critical vulnerability (CVE-2025-40551) has been identified in SolarWinds Web Help Desk, a widely used IT service management platform deployed across enterprise and public sector environments to manage support tickets, assets, and internal workflows. Successful exploitation could allow an unauthenticated attacker to execute arbitrary commands on the underlying host system.

Manic Monday: A Day in the Life of Threat Hunting

John, a Cyber Threat Intelligence (CTI) analyst, turns to look at his CISO. He seems a bit rattled. John responds, “Yeah. Huge story.” “Massive. The board is worried and wants to know if this puts us at risk. We’re secure, right?” John hesitates.“Let me get back to you on that.” The CISO walks away. John races to his desk.

The Top 5 Vulnerabilities Attackers Are Using Against Your Vendors (And What It Says About Third-Party Risk)

When threat actors target your vendors, they’re not just looking to exploit a system for a single attack. They’re looking for every opportunity to scale up their operations. This means seeking ways to push their compromises as far downstream into the supply chain as they can go.

Inside the Rise of Clone Phishing and CAPTCHA-Based Social Engineering

In our previous two posts, The ABC’s of Ishing and From Lure to Breach, we broke down the foundational tactics used by cybercriminals to deceive users and gain unauthorized access. This follow-up report expands on that foundation by exploring three evolving phishing threats that go beyond traditional email lures: clone phishing, deepfake phishing, and Captcha phishing.