Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is Swatting? How Fake Emergency Calls Turn Deadly

Cyber pranks have increased in the past few years. There is a fine line between playing a prank and harassing someone. People in the excitement of playing a prank often land themselves and others in trouble. On the other hand, some individuals harass others due to a dispute or revenge. On most occasions, victims narrowly escape the harassment against them, but sometimes, they pay severe consequences in the form of property damage, injury, or even death.

CVE-2025-59287: Critical WSUS Vulnerability Exploited in the Wild

In October 2025, Microsoft disclosed a critical remote code execution vulnerability (CVE-2025-59287) in Windows Server Update Services (WSUS), which enables unauthenticated attackers to gain full control over affected servers. WSUS is a central patch management tool in Windows environments, responsible for approving, distributing, and monitoring updates across corporate networks.

How to MFA Everywhere

What makes you, you? Is it your physical representation, your memories, your choices, your relationships? In the physical world, identity is deep and layered. But online, all of that is stripped away. To a computer, you are not your story. You are a login. You are a password, a cookie, or a session. You are a code sent to your phone. That is the entire test of your existence in the digital realm. Which means if someone else holds those same fragments, the system will treat them as you.

Introducing Bitsight Command Center: The Next Step in Cyber Risk Intelligence

Today’s security teams face disconnected tools and scattered data, which makes managing cyber risk increasingly complex. With the rapid rise in ransomware, new CVEs, and a constant stream of emerging threats, it has become difficult to monitor not only an organization’s own security posture but also the security of its third- and fourth-party vendors.

An Identity Security taxonomy for Agentic AI

Agentic AI is a fundamentally new paradigm. AI agents can interact with various tools and act dynamically and probabilistically as they encounter new inputs. That means they end up falling somewhere between an application and a user in terms of how they operate. Indeed, the interaction with other applications is what gives agentic AI its power; however, this also has implications for identity security and access management.

The enterprise AI crisis: Unsanctioned tools and unenforced policies

Unsanctioned AI tools. Patchy access controls. Unmanaged apps and devices. And of course, compromised credentials. These are the issues revealed in the 1Password Annual Report 2025: The Access-Trust Gap. The report is based on a survey of over 5,000 knowledge workers, IT and security professionals, and CISOs, and it captures a moment of profound technological and cultural transition.