Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
BlogHow Exposed OpenClaw Deployments Turn Agentic AI Into an Attack Surface
February 11, 2026SecurityScorecard’s STRIKE Threat Intelligence team details new research on exposed OpenClaw agentic AI deployments, explaining how attackers can abuse them for remote code execution and infrastructure misuse. STRIKE also shared steps organizations can take to reduce exposure.
More Details -
PressSecurityScorecard Reports Triple-Digit 2025 Partner Growth as MAX Ecosystem Expands Worldwide
February 11, 2026Channel ARR and partner-led pipeline surged in 2025 as service providers rapidly adopted MAX to deliver managed threat-informed TPRM for global supply chain resilience
More Details -
Blog, PodcastWhy India Is Emerging as a Third-Party Breach Hotspot
February 5, 2026SecurityScorecard experts analyzed why 52.6% of Indian vendors experienced at least one third-party breach in the past year in a recent webinar. India has become one of the most critical engines of the global digital economy and one of the most targeted.
More Details -
BlogStrengthening National Cyber Resilience: Reflections from My Fireside Chat with ONCD Director Sean Cairncross
February 9, 2026Mike Centrella, SecurityScorecard Head of Public Policy, shares insights from his fireside chat with the National Cyber Director Sean Cairncross on strengthening U.S. cyber resilience, deterrence, AI security, and workforce strategy.
More DetailsMichael Centrella
-
Blog, Research, STRIKEBeyond the Hype: Moltbot’s Real Risk Is Exposed Infrastructure, Not AI Superintelligence
February 9, 2026While the world debates Moltbook's role in the AI ecosystem, it is just the tip of the iceberg of Titanic risk. SecurityScorecard's STRIKE team uncovered what lurks beneath: Thousands of exposed OpenClaw (Moltbot) control panels vulnerable to takeover through misconfigured access and known exploits.
More DetailsSTRIKE Team -
Blog, STRIKEWhat Are Moltbot and Moltbook and What Happens When Agentic AI Assistants Scale Without Security
February 3, 2026Moltbot AI assistants and their social media platform Moltbook have sparked AGI fears in recent days, but the real risk is access. Learn what Moltbook and Moltbot are (now OpenClaw and formerly known as Clawdbot), why it’s not artificial general intelligence (AGI), and how to reduce security exposure.
More Details -
BlogRecent Data Breach Examples
February 10, 2026Discover how real data breach examples expose third-party risks. Learn from MOVEit, healthcare breaches, and M365 attacks to protect your business.
More Details -
BlogWhat is a SOC 2 Compliance Checklist?
February 4, 2026Use this SOC 2 compliance checklist to prepare for your audit, meet requirements, and maintain continuous compliance. Expert guidance for security leaders.
More Details -
BlogWhat Is a Brute Force Attack and How to Prevent It
January 17, 2026What is a brute force attack, how attackers use password cracking methods to gain access, and proven strategies to protect yourself.
More Details -
BlogWhat is a Parked Domain?
January 21, 2026Learn what is a parked domain, why people park domains, and the security risks they create. Discover how to protect your attack surface from hidden threats.
More Details -
BlogWhat Is an Advanced Persistent Threat
January 27, 2026Learn what an advanced persistent threat is, how APT groups operate, and how to protect your organization from these sophisticated cyber attacks.
More Details -
BlogWhat Is Cyber Incident Response and Why It Matters
February 2, 2026Learn what cyber incident response is, the steps in the incident response lifecycle, and how to build effective incident response teams and playbooks.
More Details