News

The Moltbook launch exposed a critical gap: organizations deploying AI agents faster than they can secure them. Research shows 22% of enterprises currently host unauthorised AI agent deployments, with most operating undetected and holding privileged access to corporate resources, creating a new attack vector that bypasses traditional security controls.

Modern office building at night showing AI agent security risks with autonomous systems running in corporate networks

What Moltbook reveals about AI agent security

The Moltbook launch exposed a critical gap: organizations deploying AI agents faster than they can secure them. Research shows 22%…

Dark underground stairway representing hidden SaaS security vulnerabilities and cloud dependencies

Cloud security vulnerabilities: the unpatchable risks hiding in your SaaS stack 

The cloud gives businesses scalability, agility, and built-in resilience. But it’s created a dangerous illusion: that moving workloads to SaaS…

Silhouettes of a team standing together in low light, representing collaboration within a Security Operations Center.

SOC Testing: Turning Your Security Operations Centre into a Continuous Learning Engine

SOC testing isn’t just about finding vulnerabilities. It’s about building collaboration, sharpening human judgment, and turning your SOC into a…

Wooden garden shed where CovertSwarm founder Anders Reeves conceived the idea for continuous penetration testing during COVID-19 lockdown

Why I founded CovertSwarm after annual pen tests failed me

Almost every business I worked for got breached. Our teams did the same thing each time: an occasional pen test,…

Black and white surveillance perspective view of people at a table through a car window, symbolizing covert observation and offensive security reconnaissance

When a former UK Government cyber operations chief says AI is “limitless” in Offensive Security, we should pay attention

Jim Clover says AI has made offensive cyber "limitless." Attackers are using it now. The horse has already bolted. And…

Jim Jordan joins CovertSwarm as Head of Sales in the US

CovertSwarm welcomes Jim Jordan as Head of Sales for the U.S. Division 

Jim Jordan's leadership and experience in driving growth and client engagement strengthen our mission to deliver constant offensive testing across…

CovertSwarm Welcomes James Smith as Hive Leader, Expanding Operational Technology Security Expertise

James Smith joins CovertSwarm as Hive Leader, strengthening our Operational Technology (OT) offensive security expertise CovertSwarm proudly welcomes James Smith…

City network visual symbolising interconnected systems impacted by the F5 breach

Weaponized patience: the strategic implications of the F5 breach

The F5 breach reveals the growing danger of shared infrastructure attacks. As adversaries learn faster than defenders, the only path…

aerial view of a city symbolising complexity and continuous threat readiness

Part 3: CBEST Series – The Future of Threat-Led Penetration Testing

Regulated testing like CBEST is pivotal, but as threats shift, organizations must adopt more strategic, agile threat-led penetration testing. Discover…