Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Milestone Progress: Accelerated Rating Rescans

Bitsight customers and their third-party partners are well on their way to gaining faster clarity on how their remediation efforts impact their Bitsight Security Ratings. In an effort to support organizations that use Bitsight to prioritize internal security work, we started a phased rollout of Dynamic Remediation, a new initiative that accelerates the rating refresh process and makes it more responsive to meaningful security remediations.

The Offensive Potential of Computer-Using Agents

Autonomous AI agents - known as Computer-Using Agents (CUAs) - are no longer science fiction! These systems can browse websites, interact with applications, and carry out tasks on their own. While intended to increase productivity, they can already be repurposed by threat actors for malicious use.

How AI is Changing The Way We Manage Cyber Exposure

Artificial intelligence isn’t just a buzzword in cybersecurity—it’s rapidly becoming the backbone of both offense and defense in the digital battlefield. From hyper-realistic deepfakes to machine learning-powered threat detection, AI is fundamentally changing how we manage cyber exposure.

Email List Hygiene and Cybersecurity Risks

Email is a tool that people and companies need. Conversely, poor email etiquette may put you in danger online from data leaks and phishing scams. Following cybersecurity best standards and keeping a clean email list helps to guard sensitive data. This paper covers the value of cyber hygiene in email contact, its benefits, and how technology, such as an email locating tool, could enhance security.

Analyzing llama.cpp Servers for Prompt Leaks

The proliferation of AI has rapidly introduced many new software technologies, each with its own potential misconfigurations that can compromise information security. Thus the mission of UpGuard Research: discover the vectors particular to a new technology and measure its cyber risk. This investigation looks at llama.cpp, an open-source framework for using large language models (LLMs).

CISOs: The Perfect SCORE With Your Board

You’ve done the work—mapped the risks, built the roadmap, secured the right tools. But when it’s time to face the board, the conversation stalls. Not because you’re wrong. Because you’re speaking a different language. Boards don’t operate in threat models and tech stacks. They operate in risk, revenue, and accountability. And if you want their support, you need to meet them there.

Strategies to Mitigate Risks in AI-Driven Medical Note Systems

AI isn't just changing how healthcare works-it's redefining how care is delivered. With medical note systems powered by AI, clinicians are finally getting a break from endless documentation. But with that freedom comes a new set of challenges: accuracy, data safety, and the delicate balance between tech and human judgment. If you're adopting or managing these tools, it's not just about innovation-it's about protecting what matters most. Read on to discover the key strategies every healthcare leader must know to implement AI documentation systems responsibly and effectively.

Threat Monitoring for Superannuation Security

On April 4, 2025, The Australian Financial Review reported on a set of credential abuse attacks targeting multiple Austrian superannuation funds. These attacks were not breaches of the infrastructure of those companies, but compromises of individual customer accounts via stolen credentials. How were those customer credentials stolen?