Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

API Security's Role in Responsible AI Deployment

By now, you will almost certainly be aware of the transformative impact artificial intelligence (AI) technologies are having on the world. What you may not be aware of, however, is the role Application Programming Interfaces (APIs) are playing in the AI revolution. The bottom line is that APIs are critical to AI systems – but they are also a major reason why AI systems are vulnerable to abuse. In this blog, we’ll explore why API security is critical for the safe and ethical deployment of AI.

Mastering Network Traffic Pattern Analysis for Enhanced Performance

Analyzing network traffic patterns is the heart of a successful security strategy. As organizations continue to grow their digital landscapes, cyber threats have also progressed in complexity and now utilize sophisticated evasion techniques to evade detection. Conventional security countermeasures are no longer able to cope with such dynamic and persistent security threats, hence now organizations are relying on network traffic analysis to detect and mitigate any security incidents.

Inside the Belsen Group Attack: 15000 FortiGate VPN Credentials and Configurations Exposed

It was in January 2025 when a disaster leakage of data was leaked having more than 15,000 configuration files carrying VPN credentials leaked from FortiGate devices spread on several devices. It depicts acute problems inside organizations using the products by Fortinet about a higher need for an excellent security approach. The Belsen Group, the hacking collective carried out this attack by taking advantage of the zero-day vulnerability known as CVE-2022-40684.

The 5 Biggest Phishing Attacks of 2024

Phishing attacks are a huge threat. They prey on human trust and manage to trick even the most tech-savvy users. A successful attack on a company’s customers can weaken it financially, create compliance issues, and cause long-lasting reputational damage. Scammers have stolen over $1 trillion globally in just the past year – a staggering figure that rivals the GDP of some nations.

NASA's Cybersecurity Initiative: What Spacecraft Manufacturers Need to Know

NASA is about to introduce new requirements for its contractors. These requirements will dramatically improve the cybersecurity of spacecraft and the US’ resilience to cyber threats. But what do these requirements mean for spacecraft manufacturers? What challenges will they face? And what will they need to do to comply? Keep reading to find out.

Helping the Energy Sector Navigate NERC Complexities

The energy sector is the cornerstone of modern infrastructure, powering essential services and supporting the daily operations of economies worldwide. However, it also faces unique cybersecurity challenges, particularly in complying with the North American Electric Reliability Corporation's Critical Infrastructure Protection (NERC CIP) standards.

Navigating the Evolving Threat Intelligence Landscape and Organizational Responsibility

Cyber Rhino Threat Week (which took place from December 9 – 13, 2024) aims to inform, sharing threat intelligence insights and best practices with our customers, partners and industry ecosystem. This keynote session certainly set the stage for the week, exploring the complexities that organizations must consider when establishing and operating an effective Cyber Threat Intelligence (CTI) program.

Shaping our 2025 Data Engine Priorities: Industry Evolution and Customer Feedback

The effectiveness of external attack surface management (EASM) and third-party risk management (TPRM) capabilities hinges on the depth, breadth, and timeliness of the underlying data they are based on. For this reason, Bitsight makes a significant ongoing investment in: The introduction of Bitsight’s next-generation data engine enabled many improvements to our capabilities across all of these areas throughout 2024.

Mend.io and JetBrains Partner to Bring Enhanced Code Security to Developers

At Mend.io, we’re passionate about code security. That’s why we’re thrilled to announce a strategic partnership with JetBrains that integrates Mend.io’s robust security solutions directly into JetBrains IDEs and Qodana environments. With the help of Mend.io, JetBrains users will now have access to robust Software Composition Analysis (SCA) and malicious package detection.