Groma Explorer Banner

Security Research

Bitsight TRACE is Bitsight’s security research and intelligence team. Comprised of researchers and threat analysts with deep cybersecurity experience, the team investigates and publishes information on emerging malware, vulnerabilities, and threats.

Data Discovery

Bitsight TRACE researchers leverage Bitsight’s extensive cyber data collection, mapping, and attribution technology to not only investigate security incidents, but often times identify a range of vulnerabilities and threats. The research is used throughout the security community to improve cyber readiness.

Meet the security research team

security research report

90% of security leaders say managing cyber risk is more difficult now than it was five years ago. This year’s report reveals what’s driving the complexity—and what forward-thinking organizations are doing to gain visibility, improve prioritization, and align security with business goals.

Explore exclusive findings from our global survey of 1,000 cybersecurity and risk leaders to learn how leading enterprises are transforming cyber risk intelligence into better business outcomes.

Security research report

Ransomware is up. Credential leaks are rising quickly. Malware is diversifying. This year’s report drills into how cybercriminals are evolving—and what defenders must do to keep up. We analyzed millions of endpoints, credentials, and forums to expose the realities of the cyber underground in 2024. This isn’t theory—it’s what’s actually happening right now.

security research report

In our latest research at Bitsight TRACE, we found over 40,000 open, publicly accessible network cameras, streaming live footage from offices, factories, medical facilities, and even private homes. We first raised the alarm in 2023, and based on this latest study, the situation hasn’t improved. These cameras — intended for security or convenience — have inadvertently become public windows into sensitive spaces, often without their owners’ knowledge.

Bitsight TRACE Report - Security Digitization and the Global Supply Chain CTA cover

security research report

Your supply chain isn’t just a series of links—it’s a vast, tangled web of dependencies, many of which have weak security. This report uncovers the critical but often-overlooked providers that could be the next cybersecurity weak spot, along with data-driven insights to help you mitigate risks before they disrupt your business.

CISA KEV Catalog report

Security Research Report

Bitsight TRACE research analyzing trends and insights of the Cybersecurity and Infrastructure Security Agency’s Known Exploited Vulnerabilities (KEV) Catalog. In this comprehensive report, Ben explores:

  • Prevalence of KEVs across organizations, geographies, and verticals
  • Average KEV remediation times and compliance with CISA deadlines
  • Differences in KEVs known to be part of ransomware vs other CVEs