Bonfy.AI today announced Bonfy Adaptive Content Security™ (Bonfy ACS) 2.0, the industry’s first platform built to secure enterprise content across all systems, applications, and AI agents – anywhere data moves, resides, or is processed. As organizations race to deploy copilots, custom AI apps, and increasingly autonomous AI agents, security leaders are struggling with blind spots around how these systems access, transform, and share sensitive data, gaps that legacy DLP and DSPM tools were never designed to handle. By 2028, Gartner projects that 22% of cyberattacks and data leaks will involve generative AI, and through 2029 over 50% of successful cybersecurity attacks against AI agents will exploit access‑control issues.
Bonfy delivers real-time, contextual protection across email, SaaS apps, collaboration tools, browsers, cloud and on‑prem file stores, AI systems, and agent frameworks, so enterprises can safely accelerate AI adoption without flying blind. With native coverage for Microsoft 365 (Exchange Online, SharePoint, Entra, Copilot and Purview), Google Workspace (Gmail, Google Drive, Google Directory), Salesforce, HubSpot, Slack, on‑premises file stores, AWS S3, and more, Bonfy becomes the unifying data security layer that follows content regardless of channel or AI workflow.
Built for agentic and autonomous AI
Bonfy ACS 2.0 is engineered specifically for system‑level and browser‑based AI agents that plan, reason, call tools, and execute actions across enterprise systems.
By treating agents as first‑class entities, not just extensions of users, Bonfy allows security teams to see which agents accessed which data, how they used it, and where the outputs ultimately landed. Bonfy ACS 2.0 fits cleanly into a customer’s existing security and productivity stack: it complements Microsoft Purview and M365 DLP, integrates with Microsoft Entra and Google Directory, and plugs into SIEM/SOAR tools such as Splunk, Sentinel, and Rapid7 for workflow automation, while also integrating via its MCP Server interface and APIs with modern AI platforms including Microsoft Copilot Studio, OpenAI, Anthropic Claude, Google Gemini, and other enterprise agent frameworks.
Bonfy is designed for executive level visibility and governance for CISOs, CIOs, and to be operated by security teams, security architects, and AI platform teams responsible for GenAI and agent deployments in financial services, insurance, technology, biotech/pharmaceutical, healthcare companies, and more. It provides one policy and automation engine that spans traditional data security, AI data governance, and AI agent guardrails, eliminating the need to stitch together separate point products for systems, and agents. The Bonfy platform can now be used both for projects where organizations consume AI and build AI.
Headline capabilities in Bonfy ACS 2.0
Bonfy ACS 2.0 introduces six major capabilities that together form a second-generation, high‑performance data security platform for the AI era.
- AI Agent Data Guardrails (MCP & Agent Framework Support)
Bonfy adds “data in use” security solution by adding an MCP server interface, API, and agent‑aware controls so enterprises can inspect and govern the content AI agents read, share, and generate during planning, reasoning, and execution, not just in the final output. Agents can call Bonfy inline to label and risk‑score content before it reaches external services or users, stopping AI‑driven leakage and trust‑boundary violations.
- Browser Extension for Shadow AI and Agentic Activity
A lightweight browser extension delivers real‑time, content‑aware inspection of web traffic, including unsanctioned AI tools and browser‑based assistants. Bonfy separates safe AI use from risky disclosure, detects shadow AI automations, and shows security teams exactly where sensitive data is going.
- Full Google Workspace Support
Bonfy 2.0 adds native support for Gmail, Google Drive, and Google Directory, achieving parity with Microsoft 365 integrations and extending multi‑channel protection across both ecosystems. Organizations running on Google now get unified, entity‑aware controls including contextual, automated classification labeling.
- Data Surface Visibility for AI-Era Risk
A new “data surface visibility” view gives CISOs a live map of where sensitive content lives across data stores such as Microsoft SharePoint, Google Drive, AWS S3 buckets, On-prem file stores and AI systems, and how employees and agents use it. Teams can drill from high‑level exposure down to specific actors and flows to understand real business risk, not just isolated events.
- On-Premises and Cloud File Store Coverage
Bonfy now covers on‑premises file stores and cloud object storage such as AWS S3, alongside existing SharePoint, Google Drive and other SaaS applications. This creates a unified control plane for unstructured data at rest, in motion, and in use.
- Data Minimization, Encryption Enhancements, and SOC 2
Bonfy 2.0 tightens data minimization, encryption, and configurable retention so the platform itself has a smaller, better‑protected footprint. Completing SOC 2 Type 2 certification as part of the release reinforces Bonfy’s readiness for highly regulated industries.
Availability and RSAC 2026
Bonfy ACS 2.0 is available immediately. RSAC 2026 attendees can schedule a live demo by contacting Vishnu Varma.
FBI seizes Handala data leak site after Stryker cyberattack
Posted in Commentary with tags FBI on March 19, 2026 by itnerdYou might recall that a med tech company named Stryker got pwned in epic fashion by Iran based threat actors. Click here if you need to get the details on that. Now there’s news that the FBI has seized two websites used by the threat actors behind this attack who are known as Handala:
As of Thursday, the contents of a website where Handala publicized its hacks, as well as another website that the group used to dox dozens of people over their alleged ties to the Israeli military and defense contractors, such as Elbit Systems and NSO Group, were replaced by a banner announcing the law enforcement action.
The seizure announcement did not say why the FBI and the Justice Department took down the websites. But the language in them appears to indicate U.S. authorities believed these sites were run by hackers linked to a foreign government.
“Law enforcement authorities determined this domain was used to conduct, facilitate, or support malicious cyber activities on behalf of, or in coordination with, a foreign state actor,” read the seizure announcement. “The United States Government has taken control of this domain to disrupt ongoing malicious cyber operations and prevent further exploitation.”
Brian Bell, CEO of FusionAuth, has provided the following commentary:
“The Stryker attack demonstrates that authentication and authorization are not the same thing. Attackers didn’t need to break in. They walked through the front door with compromised credentials. The missing safeguard is contextual: organizations need systems that can recognize when a privileged action is anomalous and require additional verification at that moment, not just at login. Risk-based, step-up authentication is a necessary architectural layer for organizations managing sensitive infrastructure, not just a ‘nice-to-have.’ The FBI’s seizure of Handala’s infrastructure is welcome – but the next group will find a new front door. The architectural fix has to happen on the defender’s side.”
I applaud this. Actions like this won’t stop these groups, but it will make their lives a bit more miserable. But it would be better if organizations defended themselves so things do not escalate to this level.
Leave a comment »