top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Hacktivists Are Turning Pro—and Critical Infrastructure Is Their New Playground
As ideological cyber crusaders embrace ransomware and industrial sabotage, the lines between activism, espionage, and war are...
Jul 14


Qantas Breach Reveals a Crumbling Perimeter: 5.7 Million Affected in Supply Chain Attack
The latest breach at Qantas isn’t just a wake-up call — it’s a flashing red siren for every organization still clinging to the idea of a...
Jul 11


“123456” Unlocks 64 Million Job Applications: Inside McDonald’s AI Hiring Chatbot Data Leak
It’s the kind of password you’d use as a joke. But when security researchers Ian Carroll and Sam Curry typed “123456” into the admin...
Jul 10


$100 Million Heist Exposes Brazil’s Weak Spot in Insider Risk
In a stunning display of how a single insider can become the key to a multimillion-dollar cyber heist, Brazilian authorities have...
Jul 8


How to Protect Against Tsunami DDoS Attacks
The escalating threat of Tsunami-sized web DDoS attacks is a growing concern. This emerging generation of attacks is not only larger in...
May 30, 2023


HYAS Protect At Home Launches, Offering Cyber Pros Free Home Network Protection
HYAS Infosec, a leading provider of advanced adversary infrastructure intelligence, detection, and prevention solutions, announced the...
Apr 21, 2023
bottom of page