top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Deepfake Voices Push Vishing Into the Real-Time Era
The unsettling reality of AI-powered voice impersonation has moved from theory to practice. Security researchers at NCC Group have shown...
Oct 1, 2025


Harrods Data Breach Exposes Retail’s Persistent Supply Chain Weakness
Luxury retailer Harrods is grappling with the fallout of yet another cybersecurity scare, after revealing that customer data was...
Oct 1, 2025


DarkCloud Infostealer Slips Into Manufacturing Firm Through Spear-Phishing Attack
In the unrelenting tug-of-war between defenders and cybercriminals, a new chapter has unfolded. eSentire’s Threat Response Unit (TRU) has...
Sep 29, 2025


A Ghost in the Spreadsheet: How XWorm RAT Hides in Plain Sight
Attackers are doubling down on stealth, and Forcepoint X Labs researchers have traced a recent campaign that shows just how invisible...
Sep 28, 2025


Hackers Leak Luxury Shopping Habits of Gucci, Balenciaga, and Alexander McQueen Customers
Shiny Hunters, one of the most notorious data-stealing groups on the dark web, claims to have pulled off a heist against French luxury...
Sep 15, 2025


The Largest Supply Chain Attack in History Hits NPM, Poisoning Packages With Billions of Weekly Downloads
A phishing campaign that tricked a package maintainer into surrendering credentials has triggered what researchers are calling the most...
Sep 8, 2025
bottom of page