top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Game Over — How a Public Red-Team Kit Became a Gamer-Focused Infostealer Threat
In the steadily escalating conflict between cyber-defenders and adversaries, an emerging battleground is crystal clear: the gaming community. A new tool, originally designed for legitimate red-team operations, is now being weaponized against gamers—with alarming implications for credential theft, payment fraud and identity compromise. From open-source toolbox to weaponized infostealer First released publicly in 2024, the toolkit known as RedTiger was marketed as a versatile,
Oct 27


AI Has Joined the Attack. Are Your Defenses Ready?
This guest blog was contributed by Brad Gerlach, aProduct Manager at 11:11 Systems Cybersecurity has always been a high-stakes game of cat and mouse. Defenders build taller walls, and attackers find longer ladders. But with the rapid rise of AI, the very nature of this conflict is changing. AI is no longer just a tool for defenders; it’s being weaponized by cybercriminals to automate and scale attacks with unprecedented speed and sophistication. For IT security professionals,
Oct 24


The Workforce of the Future: Human Ingenuity and AI Intelligence
This guest blog was contributed by Tom Findling , CEO and Co-Founder, Conifers.ai Artificial intelligence is reshaping the landscape, giving attackers new speed and scale while forcing defenders to rethink their operating methods. At the same time, the ongoing global shortage of skilled analysts has left security teams stretched thin and struggling to keep pace. Security leaders can’t hire enough people to tackle the problem. And they’ve invested a great deal in tools that s
Oct 24


Cybersecurity Awareness Month Comes to a Close — Has the Industry Truly Shifted to “Identity First”?
As October draws to a close, organizations worldwide are winding down campaigns marking Cybersecurity Awareness Month (NCSAM) —- an annual reminder to rethink our digital hygiene. But this year, the message landed in a very different place: no longer just about strong passwords and antivirus updates, but about who and what gets access . A new emphasis: identity at the core The theme for the 22nd edition of NCSAM underscored a stark reality: identities — both human and machine
Oct 24


Inside the AI-Supply-Chain: How a Trusted Assistant Became the Breach Vector
A new class of cyber-attack has surfaced in the age of enterprise AI, and it is rewriting the data-governance rulebook. The stealthy exploit, dubbed Shadow Escape , reportedly allows bad actors to exfiltrate sensitive personal and organizational data via standard AI assistant workflows — even when all systems appear to be operating inside trusted boundaries. The vulnerability was uncovered by the security research team at Operant AI, which characterizes the attack as a zero-c
Oct 24


AI Browsers Atlas and Comet Found Vulnerable to Sidebar Spoofing Attacks
Researchers have uncovered a new exploit that targets the AI-powered browsers Atlas by OpenAI and Comet by Perplexity, showing how attackers can create fake AI sidebars indistinguishable from the real interface to deliver malicious commands. The vulnerability—dubbed AI Sidebar Spoofing —was demonstrated by cybersecurity firm SquareX, which found that a rogue browser extension could overlay a counterfeit sidebar capable of intercepting every user interaction. The spoof mimic
Oct 24
bottom of page