top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Silverfort Unveils Next-Gen Identity Intelligence Tools, Doubling Down on Unified Identity Defense
In a move that underscores how identity has become the battlefield of enterprise security, Silverfort today rolled out two major modules for its identity protection stack: Access Intelligence and Identity Graph & Inventory . Together, they bring deeper behavioral visibility, relational mapping, and context-driven control to a platform already tackling some of the hardest corners of identity risk. These additions strengthen Silverfort’s claim to a “complete” identity securit
Oct 15


TigerJack’s Malicious VSCode Extensions Signal a Growing Supply Chain Crisis in Developer Tools
A new coordinated malware campaign is exploiting the very tools developers trust most. Researchers have discovered that a threat actor known as TigerJack has been planting malicious extensions across Microsoft’s Visual Studio Code Marketplace and the OpenVSX registry , infecting thousands of machines and turning trusted developer plugins into vehicles for data theft, cryptomining, and long-term remote control. A Stealth Campaign Hidden in Plain Sight According to security f
Oct 15


AI Is Changing the Rules of Cybersecurity — and Awareness Month Needs to Catch Up
Every October, organizations roll out familiar reminders for Cybersecurity Awareness Month: update your passwords, enable multi-factor authentication, and don’t click suspicious links. But as companies rush to embed generative AI across their workflows, those traditional talking points are starting to sound outdated. “Generative AI is everywhere—and most tools require access to your organization’s most confidential data,” said Khash Kiani , Head of Security, Trust, and IT at
Oct 14


FBI Dismantles BreachForums as Dark Web Extortionists Threaten Salesforce Data Dump
The FBI has seized the notorious BreachForums.hn domain—an underground marketplace turned extortion hub used by the ShinyHunters and Scattered Lapsus$ Hunters groups to publish stolen data from this year’s widespread Salesforce breaches. The coordinated takedown, carried out with assistance from French authorities, marks one of the most significant blows yet to the cybercriminal ecosystem that once fueled data trading and ransomware operations across industries from tech to
Oct 13


The Overlooked Cyber Risk Hiding in Plain Sight: Email Signatures
As Cybersecurity Awareness Month brings its annual spotlight on digital vigilance, one of the least-discussed risks in enterprise...
Oct 10


GreyNoise Links Coordinated Firewall Scans to Potential Multi-Vendor Attack Campaign
GreyNoise researchers have uncovered a possible coordinated offensive targeting three major enterprise firewall vendors—Cisco, Palo Alto...
Oct 10
bottom of page