Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What You Need to Know about the Crunchbase Data Breach

Crunchbase is a leading market intelligence platform that provides comprehensive data on private and public companies worldwide. Founded in 2007 and headquartered in San Francisco, California, the company serves over 80 million users, including investors, sales professionals, entrepreneurs, and business analysts.

Weekly Cyber Security News 05/02/2026

Let’s catch up on the more interesting vulnerability disclosures and cyber security news gathered from articles across the web this week. This is what we have been reading about on our coffee break! On first glance, a eye watering headline. However it comes down to them leaving credentials in an S3 bucket… It would have happened anyway.

Removing the Guesswork from CTEM

When Gartner introduced Continuous Threat Exposure Management (CTEM) in 2022, it formalized a problem security teams had been struggling with for years: patching large volumes of vulnerabilities was not translating into meaningful risk reduction. CTEM reframed the problem. Instead of measuring progress by the number of CVEs addressed, it shifted focus to whether attackers could actually reach and exploit assets that matter to the business. What Gartner did not provide was a concrete recipe for execution.

280+ Leaky Skills: How OpenClaw & ClawHub Are Exposing API Keys and PII

On Monday, February 3rd, Snyk Staff Senior Engineer Luca Beurer-Kellner and Senior Incubation Engineer Hemang Sarkar uncovered a massive systemic vulnerability in the ClawHub ecosystem (clawhub.ai). Unlike the malware campaign we reported yesterday involving specific malicious actors, this new finding reveals a broader, perhaps more dangerous trend: widespread insecurity by design. In this write-up, Snyk is presenting Leaky Skills - uncovering exposed and insecure credentials usage in Agent Skills.

Snyk Finds Prompt Injection in 36%, 1467 Malicious Payloads in a ToxicSkills Study of Agent Skills Supply Chain Compromise

The first comprehensive security audit of the Agent Skills ecosystem reveals malware, credential theft, and prompt injection attacks targeting OpenClaw, Claude Code, and Cursor users Agent skills are reusable capability packages that instruct AI agents how to interact with tools, APIs, or system resources—and they're rapidly becoming standard in AI-powered development.

SASE vs SSE: Which Is Best Suited for Your Organization

There are many NSFW instances in which substituting a single letter in a word can make the difference between a person retaining their job and finding themselves scanning career sites for a new position. Luckily, this does not carry over when looking at the difference between SASE (Secure Access Service Edge) and SSE (Security Service Edge). Both deliver security, but the two solutions deliver different outcomes, so choosing which is right for your organization is key.

What are OWASP Secure Coding Practices? Top 10 Web App Security Vulnerabilities 2021 vs 2025

OWASP (Open Web Application Security Project) is a non-profit organisation that has been in existence since 2001. Its mission is to educate (provide direction) webmasters and security professionals about how to create, buy, and keep secure, trusted software applications.” In simple terms, OWASP is a group of application security companies and experts that work collectively to develop a list of the most serious security threats to web applications.

Top 6 Supplier Cyber Risk Assessment Tools for Third-Party Risk Management

Your vendors now sit on your cyber perimeter. A single exploited payroll plug-in can become front-page news overnight. In June 2024, the U.S. Justice Department told prosecutors to ask whether companies monitor third-party partners throughout the contract, not only at onboarding. That shift helped shape our review of six purpose-built platforms built for continuous oversight. In the sections ahead, you'll see how each tool automates vendor monitoring, uses AI to cut analyst effort, and helps you keep up with fast-moving compliance expectations.

Agentic AI Security and Regulatory Readiness: A Security-First Framework

AI is getting smarter; instead of just waiting for us to tell it what to do, it's starting to jump in, make its own calls, and get whole jobs done by itself. These independent systems can mess with data, use tools, and talk to people in all sorts of places, often doing things way faster than we can keep an eye on. This means we need a new way to stay safe, one that's all about managing what these AIs do and making sure we can always see what's happening and know who's responsible.

6 Top AI Pentesting Platforms in 2026

AI penetration testing has moved beyond experimentation and into operational reality. What started as automation layered on top of traditional scanners has evolved into platforms capable of simulating attacker behavior, validating exploit paths, and continuously reassessing exposure as environments change.