Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

9 AI risks that could impact your organization-and how to mitigate them

As AI becomes more user-friendly and performance-focused, organizations are increasingly adopting it into their systems to streamline elaborate workflows. However, the rapid pace of adoption means that teams often implement AI models before fully mapping the security and compliance implications that they bring. ‍ According to Vanta’s State of Trust Report, more than 50% of organizations view AI risks as a growing concern today.

CVE-2024-36401 - GeoServer - tailoring a public PoC to enable at-scale high-confidence detection

At Bitsight, one of the responsibilities of the Vulnerability Research team is to develop fingerprinting methods to not only identify exposed services, but also vulnerabilities in those services. When it comes to detecting vulnerabilities, there are increased challenges depending on the complexity of both the vulnerability and the vulnerable service.

GeoServer CVE-2024-36401: Tailoring a Public PoC to Enable High-Confidence Detection

At Bitsight, one of the responsibilities of the Vulnerability Research team is to develop fingerprinting methods to not only identify exposed services, but also vulnerabilities in those services. When it comes to detecting vulnerabilities, there are increased challenges depending on the complexity of both the vulnerability and the vulnerable service.

How Risk Scores Are Assigned to Threats: Understanding the Metrics That Drive Security Decisions

Here’s the reality: Most organizations are drowning in threat alerts, vulnerability reports, and security incidents. Security teams can’t tackle everything at once, yet the leadership keeps asking “What should we prioritize?” Without proper risk scoring, you’re essentially playing cybersecurity roulette with your business assets.

Threat-Informed TPRM: A New Standard for Supply Chain Security

Third-party attacks have emerged as one of the most critical threats in the modern cyber landscape. Adversaries increasingly exploit vulnerabilities within external vendors, suppliers, contractors, and service providers to gain indirect access to target organizations, often with severe consequences. These breaches can lead to significant data loss, operational disruption, regulatory penalties, and reputational damage.

AI Adoption Is Outpacing Governance: Conversations on Managing AI Risk

Executives everywhere are under pressure to deploy AI fast — but our recent roundtable on AI risk, hosted by TEISS, revealed a growing concern: AI adoption is outpacing governance, and organisations are taking on more risk than they realise. While most enterprises have mature technical controls, many are missing visibility into how AI is being used — and by whom.

Critical Vulnerability Alert: CVE-2025-61882 in Oracle E-Business Suite

A critical vulnerability (CVE-2025-61882) has been identified in Oracle E-Business Suite, specifically impacting the Concurrent Processing component through its BI Publisher Integration. This widely used enterprise resource planning platform is deployed across finance, HR, procurement, and other critical business functions, making any compromise potentially devastating.

Strengthen GRC with cybersecurity: Safeguard against emerging threats

Organizations are faced with an increasingly complex and rapidly evolving threat environment. Cybersecurity plays a vital role in governance, risk management, and compliance (GRC), serving as a critical safeguard against emerging threats. As organizations integrate robust cybersecurity measures within their GRC frameworks, they are better positioned to protect their data, maintain operational integrity, and ensure compliance with regulatory requirements.

Temporary Phone Numbers: Privacy Tool or Security Risk?

Temporary phone numbers-often called disposable, burner, or virtual numbers-have become a common workaround for online verification. On the surface, they promise convenience and anonymity: sign up for a service without exposing your real number, avoid spam, test an app risk-free. But beneath that simplicity lies a dual reality: these tools can protect your privacy just as easily as they can enable fraud.

6 Ways to Make Your Risk Assessments Land With Stakeholders

As businesses expand, so do their lists of third-party vendors—and with them, the number of risk factors and complexity. This increase means that security analysts are often overwhelmed by a growing number of vendor risk assessments. However, completing an assessment alone isn’t enough; its value depends on how effectively the results are communicated.