top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Hidden backdoors, sloppy fixes: new TP-Link flaws let researchers — and attackers — root routers
Researchers at Forescout’s Vedere Labs say they’ve pulled open a fresh set of dangerous doors in TP-Link’s Omada and Festa VPN appliances — two newly cataloged vulnerabilities that let an attacker execute shell commands as root and resurrect a patched debug backdoor. The duo of flaws, tracked as CVE-2025-7850 and CVE-2025-7851 , expose an uncomfortable truth: incremental patches that don’t remove legacy developer features can create new, high-severity attack paths. The most
Oct 24


RecordPoint Acquires Redactive to Supercharge AI Data Governance Expansion
RecordPoint , the Australian-born data governance company trusted by global banks and regulators, has snapped up Redactive , a rising star in AI-driven data discovery and classification. The acquisition, announced October 21, underscores the rapid convergence of AI innovation and enterprise-grade data governance as organizations grapple with managing explosive data growth under tightening compliance regimes. AI for the Era of Data Deluge Founded just 18 months ago, Redactive
Oct 24


Hypori Expands Virtual Mobile Platform with Secure Messaging for Defense, Healthcare, and Enterprise Clients
Hypori is taking another step toward redefining mobile security. The company—long recognized for its zero-trust virtual mobile infrastructure (VMI)—has launched Hypori Secure Messaging , a communications solution designed for environments where privacy, compliance, and auditability aren’t optional. Replacing Shadow IT with Mission-Ready Messaging For years, agencies and enterprises have relied on consumer-grade apps like Signal or WhatsApp for quick communication, often crea
Oct 22


Russia-Linked Hacker Group ColdRiver Deploys Aggressive New Malware Chain Disguised as CAPTCHA
A Russian-linked hacking group notorious for espionage against Western governments has returned with a faster, stealthier, and more aggressive malware campaign—this time disguised as a simple “I’m not a robot” CAPTCHA. Google’s Threat Intelligence Group (GTIG) has identified a new, modular malware suite developed by ColdRiver —also tracked as Star Blizzard , Callisto , and UNC4057 —that replaces the group’s previous toolset known as LostKeys . According to GTIG’s October 20 r
Oct 22


Cyderes Launches “Howler Cell,” an Elite Cyber Unit Hunting Espionage Threats
Cyderes , a global managed security powerhouse known for its rapid-response capabilities, just unveiled Howler Cell , a new strike-force-style division tasked with uncovering and neutralizing the world’s most advanced cyber adversaries. Led by former FBI agents and seasoned experts from Google, Rapid7, SentinelOne, and other major security players, Howler Cell operates as Cyderes’ intelligence nerve center — part research lab, part cyber-defense special operations unit. Its m
Oct 22


Public Sector Digital Defences Under Siege: Ransomware’s Rising Tide in 2025
The public sector’s digital ramparts are buckling under the pressure of increasingly sophisticated ransomware — and 2025 is proving to be a watershed year. According to fresh intelligence gathered by the cyber-defence unit of Trustwave SpiderLabs (a division of Trustwave, now under LevelBlue), nearly 200 government or public-service entities around the globe have already been hit by ransomware so far this year. These attacks aren’t isolated incidents of data theft —they’re o
Oct 22
bottom of page