Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

New attack analysis: What you need to know about the Endesa data breach

Following the recent cyberattack on Endesa, one of Spain’s largest electricity and gas providers, Outpost24’s threat intelligence team has compiled a comprehensive analysis of the incident based on publicly available evidence from underground forums, leaked dataset listings, and the threat actor’s own statements.

Fix VMware Error: Virtual Machine Disks Consolidation Needed

The VMware virtual machine disks consolidation is needed error usually appears when snapshots fail to merge correctly with the main virtual disk. This problem often occurs after incomplete backups, canceled snapshot deletions, or low storage space. Left unresolved, it can slow down your VM or even risk data corruption. Read this blog to learn why the virtual machine consolidation needed status occurs and how to resolve it safely.

Threat Actors Exploit Misconfigurations to Spoof Internal Emails

Attackers are increasingly abusing network misconfigurations to send spoofed phishing emails, according to researchers at Microsoft. This technique isn’t new, but Microsoft has observed a surge in these attacks since May 2025. “Phishing actors are exploiting complex routing scenarios and misconfigured spoof protections to effectively spoof organizations’ domains and deliver phishing emails that appear, superficially, to have been sent internally,” the researchers write.

Episode 6 - Detecting DNS Covert Channels in the Wild (Part 2)

In Episode 6 of Corelight DefeNDRs, we delve deeper into the fascinating world of DNS covert channels with Vern Paxson, our chief scientist and co-founder. Continuing from our previous discussion, Vern shares his insights on techniques developed to detect these stealthy channels utilized by intruders to evade security measures. We explore the innovative approach of leveraging time series analysis of DNS lookups, how to distinguish benign traffic from potential threats, and the real-world implications of our findings across significant datasets.

4 Predictions Our Researchers Say Could Break (or Break Through) in 2026

As we step into 2026, Bitsight researchers are closely watching key developments across the cyber risk landscape. Their insights reveal a dynamic tension between rising threats and new opportunities to strengthen defenses. Here's what they predict for the year ahead, and what security teams should be prepared to navigate.

What is Web Application Scanning? A Guide to Securing Your Web Apps (2026)

As per Verizon’s 2025 DBIR, system intrusion, social engineering, and web application attacks form: This makes web applications one of the most common and important egress points into your business systems and customer data, and that’s why even a single undetected vulnerability here can cascade into revenue-devouring breaches, hefty compliance violations, and reputational damage that may as well take years to repair.

How to Build an Enterprise API Security Strategy (Beyond Gateways and Checklists)

In the last few years, many of the largest data exposures haven’t come from broken pages or leaked databases. They’ve come from APIs. Public reports around large-scale scraping incidents at companies like Meta and LinkedIn showed how exposed APIs, not traditional web flaws, were used to pull massive volumes of user data at scale. This isn’t an edge case anymore. APIs now sit at the center of how enterprises move data between applications, partners, and customers.

Best ADR Security Solutions in 2026: Why Full-Stack Visibility Beats Siloed Alerts

What is ADR (Application Detection & Response)? A security tool that monitors application-layer behavior—API calls, function execution, code paths—to detect and respond to threats in real-time. Different from EDR (endpoint-focused) or CDR (cloud infrastructure-focused), ADR sees what’s happening inside your applications. Why do most ADR solutions fail? They only see one layer.