top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Varonis Exposes Azure App Loophole That Let Attackers Masquerade as Microsoft Services
Security researchers at Varonis have uncovered a subtle yet powerful flaw in Microsoft Azure’s application registration system that allowed malicious actors to create fake apps with names like “Azure Portal,” bypassing long-standing safeguards meant to prevent impersonation of official Microsoft tools. The loophole—since patched by Microsoft—stemmed from the use of hidden Unicode characters to disguise application names. By inserting invisible “Combining Grapheme Joiner” cha
Oct 21


A Perfect Storm for Enterprise Risk: Cyber-Attacks, AI Blind Spots and Trade Friction Converge
In an era when geopolitics, regulation and innovation are colliding at high velocity, enterprises are sounding the alarm on a new breed of risk—one in which trade policy, state-sponsored cyber threats and under-governed artificial intelligence are converging to create a complex danger zone. According to the Riskonnect 2025 New Generation of Risk Report , a global survey of over 200 risk, compliance and resilience professionals reveals that traditional risk playbooks may be f
Oct 21


Cl0p’s Oracle Exploit Snags Envoy Air: Another Lesson in the Cost of Patch Delay
A cyber-extortion campaign exploiting zero-day vulnerabilities in Oracle’s E-Business Suite (EBS) has now ensnared Envoy Air , the Texas-based regional carrier owned by American Airlines . The airline’s name appeared on the Cl0p ransomware gang’s leak site late last week, alongside other high-profile victims including Harvard University and the University of the Witwatersrand in South Africa. The attackers claim to have stolen more than 26 GB of data , though investigators
Oct 20


Inside the Dark Web’s Trade in Government Access: Trustwave Warns of a Growing Threat to Public Sector Systems
The dark web has long been the backroom of the internet — where threat actors trade exploits, leak stolen credentials, and barter access to networks most people assume are secure. But new research from Trustwave SpiderLabs paints a sobering picture: public sector organizations, from local municipalities to national agencies, are now a hot commodity in this underground economy. VPNs for Sale: A Backdoor into Government Networks SpiderLabs researchers found a bustling market f
Oct 20


AI Model Hunts for Hidden Hardware Trojans in Computer Chips—With 97% Accuracy
In the race to make computer chips smaller, faster, and more efficient, a shadowy adversary has quietly evolved alongside innovation: hardware trojans. These malicious design alterations—sometimes just a few lines of rogue logic—can cripple systems, siphon sensitive data, or sabotage national defense infrastructure. Once a chip is fabricated, these trojans are virtually impossible to remove. Now, researchers at the University of Missouri ( MU College of Engineering ) have un
Oct 13
bottom of page