top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Ongoing Malware Campaign Steals Data Using Amazon, Azure Clouds
This guest blog was provided by Dirk Schrader, Global VP of Security Research at NNT, now part of Netwrix An ongoing malware campaign...
Jan 14, 2022


Expert Weighs In: Dissecting the HTTP.SYS vulnerability - CVE-2022-21907
Yesterday, Microsoft patched a critical vulnerability in http.sys. The vulnerability is also know by its CVE number CVE-2022-21907. ...
Jan 12, 2022


Why Increasing Ransomware Attacks Will Mandate Cyber Insurance in 2022
According to research by Cognyte’s Cyber Threat Intelligence Research Group, the number of ransomware attacks nearly doubled in the first...
Jan 11, 2022


Bad Actor Known as 'Elephant Beetle' Steals Millions from Victims
A bad actor known as 'Elephant Beetle' is reportedly stealing millions from organizations around the world, according to the Sygnia...
Jan 8, 2022


FTC to Pursue Companies That Don’t Mitigate Log4j Risk
The Federal Trade Commission yesterday issued a warning that it will pursue companies that do not take the what they are calling...
Jan 5, 2022


Log4J Vulnerabilities: The Impact on OT Cybersecurity
The Log4j vulnerabilities have been plaguing the security industry for more than a week. The good news is that security researchers have...
Dec 16, 2021
bottom of page