OPC UA Exposure Snapshot: A Year in Review of Internet-Facing Devices

Over the past year, Bitsight TRACE has identified 14,220 unique internet-exposed Open Platform Communications Unified Architecture (OPC UA) servers globally. Given OPC UA's critical role as a communication backbone for modern industrial control systems (ICS) across numerous sectors, this level of exposure warrants a closer look. Our analysis reveals that over half (51.74%) of these devices allow unauthenticated access, while 80.26% transmit data in plaintext without encryption or integrity protection.

Rubrik Agent Cloud Explained!

AI agents are active across your enterprise, yet most teams lack visibility into their actions or access to them. This video introduces Rubrik Agent Cloud, offering a Centralized Registry for full agent visibility and Policy-based Governance to monitor and block unauthorized actions in real time. And for the rogue agent, quickly undo damage with Agent Rewind.

From Alerts to Action: Dynamic Prevention

In 2020, the SolarWinds compromise showed how far attackers can go when they look legitimate. Instead of breaking in loudly, threat actors tampered with trusted software updates and gained access that appeared routine to many defenses. The U.S. government later assessed that roughly 18,000 customers installed affected Orion updates, and a smaller subset experienced follow-on intrusion activity, often discovered only after time had passed.

Evolving Cloudflare's Threat Intelligence Platform: actionable, scalable, and ETL-less

For years, the cybersecurity industry has suffered from a "data gravity" problem. Security teams are buried under billions of rows of telemetry, yet they remain starved for actionable insights. A Threat Intelligence Platform (TIP) is a centralized security system that collects, aggregates, and organizes data about known and emerging cyber threats. It serves as the vital connective tissue between raw telemetry and active defense.

CVE-2026-21513: APT28 Exploits MSHTML Zero-Day in Targeted Attacks

A Russia-linked threat actor widely tracked as APT28 leveraged a zero-day vulnerability in Microsoft’s MSHTML engine, tracked as CVE-2026-21513, in targeted operations before a security patch was made available. The vulnerability enabled remote code execution through crafted content rendered by the Windows MSHTML component, which remains embedded across supported Windows systems. The exploitation occurred in targeted spear-phishing campaigns aimed at diplomatic and defense-aligned organizations.

Is TeraBox Safe for Your Cloud Storage in 2026?

TeraBox is a Japanese cloud storage company, offering the most free cloud storage available, at 1TB. While this may seem like an attractive offer, in exchange for this storage, your free plan includes promotional advertising, speed restrictions, and privacy concerns that may cause you to reconsider for a more private alternative. To help you understand more about Terabox, what it offers, its restrictions, and potential alternatives, we will cover the following throughout this article.

How to Save Time by Using Validated IOCs, So Your Analysts Don't Have To

Learn how validated IOCs reduce false positives, improve SOC efficiency and give analysts time back by delivering contextual, high-confidence threat intelligence. SOC analysts begin each shift facing a relentless stream of alerts driven by indicators of compromise (IOCs). Many of these alerts are false positives, some are outdated, and only a small fraction genuinely reflect malicious activity.