top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


A Ghost in the Spreadsheet: How XWorm RAT Hides in Plain Sight
Attackers are doubling down on stealth, and Forcepoint X Labs researchers have traced a recent campaign that shows just how invisible...
Sep 28


Hackers Leak Luxury Shopping Habits of Gucci, Balenciaga, and Alexander McQueen Customers
Shiny Hunters, one of the most notorious data-stealing groups on the dark web, claims to have pulled off a heist against French luxury...
Sep 15


The Largest Supply Chain Attack in History Hits NPM, Poisoning Packages With Billions of Weekly Downloads
A phishing campaign that tricked a package maintainer into surrendering credentials has triggered what researchers are calling the most...
Sep 8


Jaguar Land Rover Cyberattack Exposes Fragility of Global Auto Supply Chains
Jaguar Land Rover (JLR) has confirmed that a cyberattack forced it to shut down parts of its production and retail network this weekend,...
Sep 2


Google Warns of Massive Salesforce Data Heist via Salesloft Drift Integration
A sophisticated hacking campaign exploited a popular sales automation app to steal vast amounts of data from Salesforce environments,...
Aug 28


Salt Typhoon Expands Its Reach: Chinese-Backed Hackers Breach 200 U.S. Companies and 80 Countries Worldwide
The FBI has confirmed that Salt Typhoon, a Chinese-backed hacking collective already linked to a string of telecom intrusions, has...
Aug 28
bottom of page