Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

When AI Agents Create Their Own Reddit: Moltbook Highlights Security Risks in the Agentic Action Layer

A new platform, Moltbook, has attracted significant attention within the AI community. It is not famous because humans are posting there, but because autonomous AI agents are. Moltbook is a social network designed for AI agents to post, comment, upvote, and even form communities. Humans can observe these interactions but cannot participate. This experiment reveals a striking reality. AI agents are coordinating, sharing code, and developing complex cultures without human visibility.

SpiderLabs Ransomware Tracker Update January 2025: Qilin Continues as Dominant Threat Group

The January 2026 edition of LevelBlue SpiderLabs ransomware tracker noted a sharp fall in the number of attacks launched compared to December 2025. Qilin remained the top attacker, but there was a reshuffling of the remaining top five attackers for the month.

The Prescriptive Path to Operationalizing AI Security

In introducing the AI Security Fabric, we have outlined how security must evolve as software is built by humans, models, and autonomous agents working at machine speed. The Fabric defines the architectural shift required to build trust at AI speed, delivered through the Snyk AI Security Platform. We’re now focusing on the next question: how organizations put that vision into practice. Operationalizing AI security is not about enabling a single feature or deploying a tool.

Introducing the AI Security Fabric: Empowering Software Builders in the Era of AI

Today, we’re thrilled to introduce the AI Security Fabric, delivered through the Snyk AI Security Platform, and operationalized through a prescriptive path for AI security. As software creation shifts to humans, models, and autonomous agents working together at machine speed, security must evolve just as fundamentally. The AI Security Fabric defines the new paradigm, and the Prescriptive Path shows how the Snyk AI Security Platform gets you there.

What happens after the attack: From cybersecurity to cyber resilience

Cybersecurity plays a critical role in preventing attacks through controls such as firewalls, endpoint protection and email security. Despite these investments, breaches still happen. According to the World Economic Forum, 87% of respondents identified AI-related vulnerabilities as the fastest-growing cyber risk in the past year.

How MSPs in Australia can strengthen SME cybersecurity with the Cyber Health Check

Small and medium enterprises (SMEs) across Australia and New Zealand are struggling to secure their operations. The threats they face are constantly growing in both number in severity, but SMEs often lack the time, resources or in‑house expertise to protect themselves. Fortunately, the Cyber Health Check from the Australian Signals Directorate (ASD) offers a simple, practical way for organisations to assess their cyber maturity and understand where they can improve cyber protection.

Cyber Risk in 2026: From Today's Pressures to Tomorrow's Threats

As we enter 2026, security and risk leaders are navigating a landscape that is both increasingly complex and strikingly familiar. At Bitsight, we have spent the last year listening to our customers, synthesizing insights from the field, and preparing for what lies ahead. In a recent webinar with my colleague Vanessa Jankowski, we explored the forces shaping cyber risk in the year to come.

Critical Vulnerability Alert: CVE-2025-40551 in SolarWinds Web Help Desk

A critical vulnerability (CVE-2025-40551) has been identified in SolarWinds Web Help Desk, a widely used IT service management platform deployed across enterprise and public sector environments to manage support tickets, assets, and internal workflows. Successful exploitation could allow an unauthenticated attacker to execute arbitrary commands on the underlying host system.

Comprehensive Data Exfiltration Prevention: A New Architecture for Modern Threats

The exfiltration problem has evolved beyond what traditional DLP was designed to solve. Your employees work across personal AI assistants, multiple browsers, dozens of SaaS applications, and offline environments. They collaborate through Git, communicate via email clients, and store data on external drives. Each interaction represents a potential data loss vector—and legacy solutions can't see most of them.