top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Aftermarket Infotainment Systems in Cars Can Be Turned into Surveillance Tools
Researchers Alex Plaskett and McCaulay Hudson from NCC Group recently demonstrated how an attacker could use zero-day vulnerabilities in...
Mar 13, 2025


Russia’s ‘Pravda’ Disinformation Network is Poisoning Western AI Models
A well-funded Moscow-based propaganda machine has successfully infiltrated leading artificial intelligence models, flooding Western AI...
Mar 10, 2025


Chinese Espionage Group Silk Typhoon Adopts New Tactics to Exploit IT Solutions
Microsoft Threat Intelligence has sounded the alarm on a critical shift in cyber threat tactics employed by Silk Typhoon, a...
Mar 6, 2025


Typosquatting Campaign Hits Go Ecosystem: Malicious Packages Target Developers with Hidden Malware
A newly uncovered typosquatting campaign is actively targeting developers in the Go ecosystem, embedding stealthy malware within...
Mar 6, 2025


Ransomware Surge in February 2025: Clop, RansomHub, and Medusa Lead a Relentless Onslaught
February may be the shortest month of the year, but it packed a devastating punch in the world of cybercrime. According to a recent...
Mar 6, 2025


Microsoft Dismantles Massive GitHub-Based Malvertising Operation Impacting Nearly One Million Devices
Microsoft has moved swiftly to dismantle a vast malvertising campaign that leveraged GitHub repositories to distribute malware to nearly...
Mar 6, 2025
bottom of page