top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


A New Android Banking Trojan Is Quietly Perfecting Full-Device Takeovers
A newly uncovered Android banking trojan is giving security researchers an uncomfortable sense of déjà vu — but with several twists that signal where mobile malware is headed next. The malware, dubbed Sturnus , doesn’t just steal banking credentials. It learns. It adapts. And it leverages the same encrypted-app ecosystem people trust to protect their most sensitive conversations. Researchers at ThreatFabric say Sturnus is still in its early evaluation phase, but its technical
Nov 21, 2025


Salesforce Yanks Gainsight Apps Amid OAuth Turmoil as Security Teams Brace for Ripple Effects
Salesforce has pulled the emergency brake on a swath of Gainsight-published applications after uncovering suspicious activity tied to the integrations — a move that instantly set off alarm bells across the SaaS security world and reignited concerns about the increasingly fragile state of OAuth-based trust models. Shortly after 8:00 p.m. on November 19, Salesforce issued a security advisory confirming that unusual activity linked to Gainsight applications could have enabled un
Nov 21, 2025


Ransomware Surges 41% as Cybercriminals Kick Off the ‘Golden Quarter’
Ransomware crews didn’t wait for Black Friday to get busy. New data from NCC Group shows global attacks spiked 41% in October, surging to 594 incidents — an abrupt jump that signals cybercriminals are already gearing up for the year’s most profitable stretch. October traditionally marks the beginning of ransomware’s “golden quarter,” when the mix of holiday shopping, frantic IT teams, and supply-chain pressure creates an unusually rich attack surface. This year’s early wave
Nov 18, 2025


Inside the First Alleged AI-Orchestrated Espionage Campaign: How Hackers Turned Claude into an Autonomous Cyber Weapon
Anthropic’s revelation that hackers linked to China allegedly used its Claude AI system to automate attacks against roughly 30 organizations has ignited one of cybersecurity’s most polarizing debates yet: can artificial intelligence truly orchestrate espionage on its own—or is this another case of overhyped “AI panic” masking a deeper failure of model governance? The Rise of the AI Operator According to Anthropic, the attackers disguised themselves as cybersecurity researcher
Nov 14, 2025


AI Malware Evolves: Google Exposes New Wave of Self-Modifying, LLM-Powered Attacks
Google’s Threat Intelligence Group (GTIG) is warning that artificial intelligence is no longer just a tool for defenders — it’s becoming an active accomplice in cybercrime. In its latest report, the company outlines a new class of malware that uses large language models (LLMs) not just to assist development, but to rewrite itself dynamically during execution. From Static Code to “Thinking” Malware GTIG calls this technique “just-in-time self-modification.” It enables malicio
Nov 5, 2025


Apple’s Mega Patch: Over 100 Security Fixes Signal New Urgency Around iPhone and Mac Defenses
Apple just dropped one of its largest security updates in years — and while the company insists no vulnerabilities are under active attack, the scale of the release tells a different story about the growing complexity of its ecosystem. Across its major platforms, Apple patched an eye-popping 105 vulnerabilities in macOS 26.1 , 56 in iOS and iPadOS 26.1 , 43 in visionOS , 32 in watchOS , and 21 in Safari , along with two in Xcode. The cumulative list reads like a blueprint of
Nov 5, 2025
bottom of page