Blog

Security Insights

Deep dives, expert analysis, and practical guidance on exposure management, adversarial validation, and the future of AI-driven exposure management.

Checkmarx and Bitwarden supply chain attack: Your CI/CD pipeline is the attack surface
CybersecurityVulnerability Intelligence

Checkmarx and Bitwarden Just Showed That Your Pipeline Is the Attack Surface

How the Checkmarx supply chain attack compromised Bitwarden's CLI pipeline in four minutes, what was stolen, and the program design gap that made it possible.

Apr 29, 20267 min
AI-Accelerated Offense: 5 days to weaponize a disclosed vulnerability, 131 new CVEs daily, 44% surge in AI-driven attacks, 80-90% of attacks now autonomous
Offensive SecurityCybersecurity

AI-Accelerated Offense: The Cyberattack Your Security Program Was Never Built to Stop

AI-Accelerated Offense uses autonomous agents to run the full cyberattack chain in hours. A frontier AI model found thousands of zero-day vulnerabilities across every major OS and browser in weeks. See how it works, why your security program is already behind, and what to do now.

Apr 23, 202613 min
Best AI Pentesting Tools in 2026 - Ranked Priced and Compared
Penetration TestingCTEM

Best AI Pentesting Tools in 2026: Ranked, Priced & Compared (12 Tools)

Which AI pentesting tool actually reduces risk in 2026? We reviewed 12 platforms on autonomy, proof quality, pricing, and what happens after a vulnerability is found.

Apr 9, 202627 min
Is Claude Mythos the End of Pentesting - Featured Image
CTEMPenetration Testing

Is Claude Mythos the End of Pentesting?

Claude Mythos found thousands of zero-days in Linux, browsers, and Apache. Does that make pentesting platforms obsolete? Understanding why models, harnesses, and platforms are three different things -- and why smarter AI makes Strobes more valuable, not less.

Apr 8, 202612 min
How to Write an Effective AI Agent Skill Four-Layer Architecture
engineeringOffensive Security

How to Write an Effective AI Agent Skill: The Four-Layer Architecture

Most teams building AI agents get the ratio wrong: 90% code, 10% methodology. Here is the four-layer architecture Strobes uses to build skills that run complete security assessments autonomously.

Mar 31, 20267 min
Strobes AI The Agent Stack Specialized for Offensive Security
Offensive SecurityCTEM

Strobes AI: The Agent Stack Specialized for Offensive Security

A deep-dive into the multi-agent architecture behind Strobes AI — 12 purpose-built offensive security agents, the Skills system, Human in the Loop governance, and the architectural properties that make continuous exposure management viable at scale.

Mar 27, 20268 min
Agentic Pentesting with Strobes AI — 32 tasks, 21 WSTG phases, 42 confirmed vulnerabilities, fully autonomous
Offensive SecurityPenetration Testing

Agentic Pentesting with Strobes AI

What happens when you point Strobes AI at a real web app and let it run a full OWASP WSTG assessment with zero hand-holding? 32 tasks, 21 phases, 42 confirmed vulnerabilities — all autonomous.

Mar 25, 20269 min
AI Harness for Offensive Security - Strobes blog cover showing multi-agent architecture concept
Offensive SecurityPenetration Testing

Building an AI Harness for Offensive Security: What It Takes to Turn LLMs Into Reliable Pentest and Validation Operators

The model is 20% of the problem. Here is the engineering story behind the orchestration, tooling, middleware, and infrastructure that turns a capable LLM into a reliable penetration testing operator.

Mar 22, 202614 min
Three-angle crawl strategy: static analysis, swarm crawling, browser handover into Strobes orchestrator
Penetration TestingOffensive Security

Why Crawling Is the Hardest Part of AI-Powered Pen Testing (And How We Fixed It)

AI agents are brilliant at reading code but terrible at navigating browsers. Here's how Strobes combines static analysis, CDP-based swarm crawling, and human browser handover to build a complete attack surface map before testing begins.

Mar 20, 202612 min
Securing from Active Directory Attacks
Offensive Security

Securing from Active Directory Attacks

Active Directory (AD) lies at the heart of your organization's Windows network, silently orchestrating user access, authentication, and security. But do you truly understand its workings and the potential risks posed by active directory attacks? This blog peels back the layers of AD, revealing its c

Aug 6, 20248 min
Offensive Security 101: Everything You Need to Know
Offensive Security

Offensive Security 101: Everything You Need to Know

For most, the term "offensive" evokes images of aggression and harm. But in cybersecurity, offensive security takes on a whole new meaning: proactive, strategic, and ultimately, robust security. That's the essence of offensive security, a practice that's rapidly evolving from a niche expertise to a

Jan 17, 20249 min