Black Kite is a finalist in the 2026 SC Awards for continued innovation and leadership in third-party cyber risk intelligence.Learn more
BlackKite: Home
Menu

Black Kite Blog

Keyword Search
blog

Understand Supply Chain Risk Susceptibility to Prevent New Microsoft Exchange Server Ransomware Attacks

How Black Hat served as a catalyst for the ProxyShell attack, and the latest security updates customers should install for protection.

Aug 27, 2021
blog

Ransomware Attacks Against the Fortune 500: Lessons Learned From Accenture

It is not a surprise why a Fortune 500 company such as Accenture entered cybercriminals’ radar. They have a wealth of client data at stake.

Aug 25, 2021
blog

T-mobile Hacked 6 Times in Last 4 Years

T-Mobile made yet another appearance on the list of data breach victims, putting the data of over 40 million consumers at risk.

Aug 23, 2021
blog

Third-party Data Breaches in July 2021, Revealed: Ransomware Continues Its Reign

Third-party data breaches in July 2021: ransomware continues its reign. Black Kite Research on the four largest supply chain incidents of the month.

Aug 3, 2021
blog

Inside the Mind of a Cybercriminal: Common Hacking Methods, Explained

Preventing unrecognized cyber risk requires organizations to understand the signals that suggest suspicious behavior.

Jul 29, 2021
blog

Simplifying Vendor Security Assessments, Part Ii: Questions to Ask Along the Road

Simplifying vendor security assessments, Part II: the questions that actually surface third-party risk — and the ones that just generate paperwork.

Jul 21, 2021
blog

Simplifying Vendor Risk Assessments, Part I: Designing Your Vra Roadmap

Simplifying vendor risk assessments, Part I: how to design your VRA roadmap in five steps — without the questionnaire bloat that stalls most TPRM programs.

Jul 16, 2021
blog

The Top Five Third-party Data Breaches in June 2021, Revealed

Data breaches in June targeted automative manufacturers first, with both Volkswagen and Mercedes-Benz' customer data leaked, impacting millions.

Jul 8, 2021
blog

Ransomware Day Strikes Again: What Kaseya Should Teach Us

Ransomware groups are constantly improving their strategy, but these attacks are not brand new, we must become stronger than the bad actors.

Jul 7, 2021
blog

The Most Common Cybersecurity Threats Facing Supply Chains in 2021

As we enter the second half of 2021 and reflect back on the previous six months, it’s clear that all eyes are now on supply chain security.

Jun 30, 2021
blog

Four Cybersecurity Tips for Navigating to a Hybrid Work Environment

Today's new work model requires new security measures. Keep your organization and your employees safe with these tips for managing a hybrid work model

Jun 16, 2021
blog

How to Create an Effective Cyber Incident Response Plan

How to build a working cyber incident response plan: the 5 phases — preparation, detection, containment, analysis, recovery — and what each requires.

Jun 9, 2021

Ready to connect cyber risk intelligence to your entire risk program?

Integrate risk intelligence into every part of your workflow so you can make more informed decisions with confidence.