Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Growing Challenge of Shadow MCP: Unauthorized AI Connectivity in Your Codebase

MCP adoption is surging across industries, fundamentally reshaping how systems connect to AI models. By establishing a universal protocol for data exchange, MCP simplifies integration complexity, empowering developers to build sophisticated AI capabilities in a fraction of the traditional development time. However, this streamlined connectivity to AI tools introduces significant security risks.

Bitsight Identifies Thousands of Security Cameras Openly Accessible on the Internet

Welcome to 2025, where thousands of internet-connected cameras meant to protect us are actually putting us at risk. In our latest research at Bitsight TRACE, we found over 40,000 exposed cameras streaming live on the internet. No passwords. No protections. Just out there. We first raised the alarm in 2023, and based on this latest study, the situation hasn’t gotten any better.

Automate Cloud SIEM investigations with Bits AI Security Analyst

Security analysts face unprecedented challenges in today's cloud landscape. Security operations center (SOC) teams are chronically understaffed, and cybersecurity threats are skyrocketing—further intensified by GenAI-driven attacks. High false positive rates add to this strain, fueling alert fatigue and delaying the detection of real threats. These hurdles make it harder for analysts to keep pace, which ultimately drives up mean time to resolution (MTTR).

Unified Security: Bridging the Gaps with a Defense-in-Depth Approach

The identity is the main attack vector for cybercriminals, with cybercriminals using stolen identity to infiltrate the organization, move laterally and vertically throughout the organization, and extract data, deploy ransomware, establish backdoors, and cause major service disruptions. All with long term impact to organizations.

WatchGuard Earns 2025 Top Rated Awards From TrustRadius

We’re proud to announce that WatchGuard has earned eight 2025 Top Rated Awards from TrustRadius, a trusted platform where real users share honest feedback. These awards highlight the exceptional value our customers experience across security categories, directly reflecting their reviews and satisfaction.

Phone Cloning: How Hackers Copy Your Phone and How You Can Protect Yourself

Cell phone cloning was first recorded in the 1990s when analog phone networks were common. During this period, malicious actors exploited vulnerabilities in the analog system to clone phones and access services while avoiding any charges. However, with technological advancements, phone cloning techniques have also adapted and become more sinister. Fraudsters now exploit vulnerabilities in mobile device software and security systems, enabling them to clone a phone remotely without needing physical access.

OT Security Lessons from the Trenches: Patterns and Pitfalls from BACS Assessments

The convergence of Building Automation and Control Systems (BACS) and smart building innovation within operational technology (OT) is helping to drive technological and environmental advances. However, it is also contributing to the emergence of significant security vulnerabilities and threats.

Stealth Cyberattacks at Night: How Librarian Ghouls Are Exploiting Trusted Tools to Evade Detection

The cyber threat landscape is rapidly evolving. Among the most recent and concerning trends is the use of stealth attacks that bypass traditional defenses by abusing legitimate tools. One such campaign, led by a group called Librarian Ghouls, is targeting organizations across Russia with cleverly disguised phishing emails, cryptominers, and remote-access software—often operating undetected in the middle of the night.

New Cybersecurity Executive Order Redraws Priorities: What It Means for AI, Digital IDs, and Supply Chain Security

As the global cyber threat landscape continues to evolve, the latest cybersecurity executive order from the Trump administration is making waves—setting new priorities while reversing some of the cornerstone initiatives from previous administrations. The new directive pivots away from centralized federal control and compliance-heavy practices, placing a sharper focus on AI innovation, post-quantum cryptography, and software security by design.

How Hacker Groups Exploited AI to Develop Malware and Spread Disinformation-What It Means for Digital Security

In a bold move aimed at safeguarding its AI ecosystem, OpenAI recently disabled several ChatGPT accounts linked to Russian, Chinese, and Iranian threat actors. These malicious entities exploited the chatbot’s capabilities to aid malware development, launch social media influence campaigns, and probe U.S. satellite communications infrastructure.