Blog

Security Insights

Deep dives, expert analysis, and practical guidance on exposure management, adversarial validation, and the future of AI-driven exposure management.

Checkmarx and Bitwarden supply chain attack: Your CI/CD pipeline is the attack surface
CybersecurityVulnerability Intelligence

Checkmarx and Bitwarden Just Showed That Your Pipeline Is the Attack Surface

How the Checkmarx supply chain attack compromised Bitwarden's CLI pipeline in four minutes, what was stolen, and the program design gap that made it possible.

Apr 29, 20267 min
NIST Just Changed How It Tracks and Prioritizes CVEs - NVD Update 2026
CVEVulnerability Management

NIST Just Changed How It Tracks and Prioritizes CVEs

NIST has changed how it enriches CVEs in the NVD. Learn what the new risk-based triage model means for your vulnerability management program, scanner data, and remediation workflows.

Apr 29, 202613 min
AI-Accelerated Offense: 5 days to weaponize a disclosed vulnerability, 131 new CVEs daily, 44% surge in AI-driven attacks, 80-90% of attacks now autonomous
Offensive SecurityCybersecurity

AI-Accelerated Offense: The Cyberattack Your Security Program Was Never Built to Stop

AI-Accelerated Offense uses autonomous agents to run the full cyberattack chain in hours. A frontier AI model found thousands of zero-day vulnerabilities across every major OS and browser in weeks. See how it works, why your security program is already behind, and what to do now.

Apr 23, 202613 min
Vercel security breach 2026 featured image
Data BreachesCybersecurity

The Vercel Hack: How One AI Tool Compromised the Infrastructure Behind Millions of Websites

Vercel's April 2026 security breach started with one AI tool's OAuth approval. Here is the full attack chain, blast radius, and what every security team must do now.

Apr 20, 202613 min
Best AI Pentesting Tools in 2026 - Ranked Priced and Compared
Penetration TestingCTEM

Best AI Pentesting Tools in 2026: Ranked, Priced & Compared (12 Tools)

Which AI pentesting tool actually reduces risk in 2026? We reviewed 12 platforms on autonomy, proof quality, pricing, and what happens after a vulnerability is found.

Apr 9, 202627 min
Is Claude Mythos the End of Pentesting - Featured Image
CTEMPenetration Testing

Is Claude Mythos the End of Pentesting?

Claude Mythos found thousands of zero-days in Linux, browsers, and Apache. Does that make pentesting platforms obsolete? Understanding why models, harnesses, and platforms are three different things -- and why smarter AI makes Strobes more valuable, not less.

Apr 8, 202612 min
Strobes VI Supply Chain Attacks Ransomware Groups Threat Actors - Featured Image
Product UpdatesVulnerability Intelligence

Strobes VI Now Tracks Supply Chain Attacks, Ransomware Groups, and Threat Actors

224,487 supply chain incidents. 1,251 threat actors. Ransomware groups tracked in real time. Strobes VI now provides the threat intelligence layer that powers proactive exposure management, starting with the lessons from the Axios npm compromise.

Apr 3, 202611 min
The Worst Data Breaches of March 2026 featured image
Data Breaches

The Worst Data Breaches of March 2026

Nine confirmed data breaches across the US and Europe in March 2026, from a 200,000-device wipe at Stryker to 15.8 million patient records stolen at Cegedim Sante. Here is what happened, breach by breach, and what the pattern tells defenders.

Apr 2, 20269 min
How Strobes AI Turns a Supply Chain Zero-Day into Full Exposure Assessment
CTEMCybersecurity

How Strobes AI Turns a Supply Chain Zero-Day into a Full Exposure Assessment in Under 30 Minutes

When the axios npm package was compromised on March 31, 2026, Strobes AI agents autonomously performed incident response, identified every exposed repository across the attack surface, and generated a complete exposure assessment with remediation tasks in under 30 minutes.

Mar 31, 202610 min
Axios npm Supply Chain Attack 83M Weekly Downloads Compromised
CTEMVulnerability Intelligence

Axios npm Supply Chain Attack: 83M Weekly Downloads Compromised by Cross-Platform RAT

On March 31, 2026, attackers compromised the axios npm maintainer account and published backdoored versions deploying a cross-platform RAT to macOS, Windows, and Linux. Full incident breakdown with IOCs, detection guidance, and real-time AI-driven response.

Mar 31, 20269 min