Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2024-36401 - GeoServer - tailoring a public PoC to enable at-scale high-confidence detection

At Bitsight, one of the responsibilities of the Vulnerability Research team is to develop fingerprinting methods to not only identify exposed services, but also vulnerabilities in those services. When it comes to detecting vulnerabilities, there are increased challenges depending on the complexity of both the vulnerability and the vulnerable service.

SIEM's Next Chapter: Evolving, Not Dying

The obituary for SIEM has been written more than once. The latest headline from Dark Reading calls it “dying a slow death.” Catchy. But wrong. If you work in a SOC, you already know the need for centralized, contextualized visibility is not going anywhere. What is changing the future of SIEM, is how SIEM delivers it. If you are still thinking of SIEM as a clunky, high-cost log hoarder, you are stuck in the wrong decade.

A step-by-step guide to AI security assessments [With a template]

As artificial intelligence becomes deeply integrated into business operations, organizations have started feeling the pressure to keep up. According to Vanta’s 2025 survey, more than 50% of the organizations report being overwhelmed by the speed of AI adoption and growing compliance obligations. ‍ This issue is aggravated by the fact that AI tools evolve faster than governance policies can adapt, potentially leaving complex gaps for security teams to fill.

Exposed, Misconfigured and Forgotten: The Triple Threat of External Risk (and how to fix with Cloudflare and IONIX)

If popular TV and movies are to be believed, hackers break into organizations from dark rooms using flashy zero-day exploits (complete with some sort of showy animation), all while techno music blares in the background, culminating in the oh-so-cool announce of “I’m in!” This… is not reality. The unglamorous truth is that breaches usually stem from a series of small mistakes in unremarkable things: A system that was overlooked when implementing a new policy.

Tackling the Modern WAF Challenge: Why Managed WAAP Is the Key to Effective Application Security

Organizations today face a continuous struggle to secure their web applications against threats that constantly evolve in the fast-paced digital landscape. The Web Application Firewall (WAF) serves as a primary line of defense against these threats; however, its management challenges often outweigh its security benefits, resulting in organizations not realizing the full value of their security investment.

Anatomy of a Modern Threat: Deconstructing the Figma MCP Vulnerability

Threat researchers recently disclosed a severe vulnerability in a Figma Model Context Protocol (MCP) server, as reported by The Hacker News. While the specific patch is important, the discovery itself serves as a critical wake-up call for every organization rushing to adopt AI. This incident provides a blueprint for a new class of attacks that target the very infrastructure powering the AI Agent Economy. To understand the risk, we must first look at the mechanics of this emerging threat.

Regulatory Frameworks Affecting AI and Data Privacy Explained

AI is now embedded in everyday operations across support, finance, healthcare, and the public sector. As models touch more sensitive data, the legal landscape is moving just as quickly. The center of gravity has shifted from annual checklists to continuous compliance in production. This guide explains the regulatory frameworks affecting AI and data privacy in 2025, how they fit together, and how to turn their requirements into practical, repeatable controls your teams can run every day.

EP 17 - Privilege creep and the machine identity surge: Securing the modern enterprise

In this episode of Security Matters, Chris Schueler, CEO of Cyderes, joins host David Puner for a dive into the evolving challenges of enterprise security. The conversation explores the dangers of privilege creep, the explosion of machine identities, and why accountability at every point of interaction is essential for building resilient teams and systems.

Top 7 Online Penetration Testing Tools in 2025

Online penetration testing is a proactive cybersecurity practice that aims to identify vulnerabilities in your web app, network, mobile application, or infrastructure. Think of it as your digital security guardian scrutinizing your defenses by stimulating real cyber intrusions remotely. Before we get into the debate of which online penetration testing tool is the best for you, want to see the power of online penetration testing in action? Try our free website scanner!