top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


New York Unveils Cyber Rules to Fortify Water Systems, But Experts Warn: “Implementation Won’t Be Easy”
New York is sending a strong message to hackers: stay out of the water. This week, three of the state’s key regulatory bodies — the...
Jul 24


Ransomware Retreats—But Don’t Mistake It for Surrender
For the first time in months, defenders can breathe a little easier. Global ransomware attacks fell 43% in Q2 compared to Q1, with a 6%...
Jul 23


MSPs Are Drowning in Cyber Demand. Cynet’s New Report Shows Why It’s Not Just a Tech Problem
As ransomware grows more ruthless and threat actors become more automated than the defenders trying to stop them, managed service...
Jul 23


Hackers Are Hijacking Microsoft Teams Calls to Install Stealth Malware
A new variant of the Matanbuchus malware loader is being deployed through a crafty new attack method: Microsoft Teams calls that...
Jul 17


Inside China’s Phone-Seizing Malware—and How Corporate Security Is Adapting
When Chinese police seize your phone, they don’t need a password—or a warrant—to get what they want. Thanks to new forensic malware known...
Jul 16


macOS Malware Surge Signals New Infostealer Arms Race
Once dismissed as a niche threat, macOS infostealers are becoming a core pillar of the cybercrime economy—and a growing liability for...
Jul 11
bottom of page