Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is OpenClaw andAgentic AI? The Security Issues You Need to Be Aware of Now

Over the past several weeks, OpenClaw and MaltBook have exploded across the headlines. Outlets have published stories about AI agents organizing themselves or even acting independently on Moldtbook. SecurityScorecard’s Jeremy Turner, VP of Threat Intelligence & Research and Anne Griffin, Head of AI Product Strategy discuss what OpenClaw is, how agentic AI works, and where the real security issues are based on new research from SecurityScorecard's STRIKE Threat Intelligence team.

The best risk management software for 2026

For many organizations, risk management is still stuck in the past—reliant on spreadsheets, manual reviews, and static registers that go stale shortly after they’re created. Without clear ownership or automation, treatment plans linger, and accountability slips. Risks remain fragmented across departments, disconnected from business impact and board visibility. ‍ At the same time, emerging threats are evolving faster than ever.

A Match Made in Heaven: How Valentine's Day Fuels Seasonal Phishing Attacks

Valentine’s Day runs on emotion. Surprise, urgency, curiosity, trust, love. For threat actors, that combination is hard to beat. Every year in mid-February, security teams see the same pattern. Phishing campaigns pick up. Brand impersonation increases. Fraud attempts follow close behind. It is not because attackers suddenly developed new techniques.

CISA BOD 26-02 and the Next Phase of Vulnerability Management

CISA recently published BOD 26-02, the latest Binding Operational Directive shaping how federal agencies manage cyber risk. While attention often gravitates toward highly visible directives like KEV, this one matters for a different reason: it raises the standard for how lifecycle risk must be tracked and sustained over time. BOD 26-02 is described as guidance on unsupported edge devices, which is accurate but incomplete.

How Cybersecurity Impacts Criminal Defense Today

A phone that will not unlock can stall an entire case before the paperwork is even filed. A cloud account login from a new device can flip the narrative in minutes, because the trail people once chased through witnesses now runs through alerts, access records, and exported chats. That shift is easy to miss until you are the one trying to explain what happened, and you realize the first questions are no longer just "where were you" but "which device," "whose credentials," and "what did the logs record."

Why This Moment Matters: Announcing our Series C Funding

Today, we announced our Series C funding. I want to start by saying thank you to Delta-v Capital and Arthur Ventures for their partnership and conviction in what we’re building. We’re grateful for their support and for the trust they’ve placed in our team. They didn’t invest because Nucleus tells a good story.

Securing the Human Layer: The Evolution of Cyber Attacks | Podcast

In this one-off exclusive podcast, Oliver Simonnet, CultureAI's Lead Cyber Security Researcher, sits down with William Jardine, Director at Reversec, and Richard Moore, CISO at 10x Banking, to explore the evolving realities of cyber resilience, AI adoption, and security leadership in a world where AI-driven workflows are becoming the norm.

Exposed OpenClaw Deployments are Turning Agentic AI Into an Attack Surface: What To Do Next

SecurityScorecard's STRIKE Threat Intelligence team has uncovered tens of thousands of exposed OpenClaw instances, many of which are vulnerable to Remote Code Execution (RCE). These exposed OpenClaw instances leave users and organizations open to attacks. OpenClaw and other agentic AI tools are designed to take actions on a user’s behalf, interact with infrastructure, and move across connected services. That functionality is the appeal. It is also the risk for users around the globe.

AI Governance Suite Enhanced for Operational Oversight and Action

Kovrr's AI Governance Suite, released in November 2025, was designed to help organizations bring structure to how they assess and manage AI risk. Since then, it has been adopted by dozens of CISOs and AI GRC professionals operating in environments where GenAI tools and other AI systems were already embedded into daily business operations. Through their usage and feedback, however, a clear pattern emerged.

How Mobile Access Changes the Way Active Traders Manage Positions

Financial markets move quickly, and timing affects every trading decision. Mobile activity now plays a major role in how markets are accessed. Recent market data shows that nearly 25 percent of total trades on Indian stock exchanges are placed through mobile platforms, highlighting a shift toward on-the-go trading.