top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Cybersecurity Awareness Month Comes to a Close — Has the Industry Truly Shifted to “Identity First”?
As October draws to a close, organizations worldwide are winding down campaigns marking Cybersecurity Awareness Month (NCSAM) —- an annual reminder to rethink our digital hygiene. But this year, the message landed in a very different place: no longer just about strong passwords and antivirus updates, but about who and what gets access . A new emphasis: identity at the core The theme for the 22nd edition of NCSAM underscored a stark reality: identities — both human and machine
Oct 24, 2025


Inside the AI-Supply-Chain: How a Trusted Assistant Became the Breach Vector
A new class of cyber-attack has surfaced in the age of enterprise AI, and it is rewriting the data-governance rulebook. The stealthy exploit, dubbed Shadow Escape , reportedly allows bad actors to exfiltrate sensitive personal and organizational data via standard AI assistant workflows — even when all systems appear to be operating inside trusted boundaries. The vulnerability was uncovered by the security research team at Operant AI, which characterizes the attack as a zero-c
Oct 24, 2025


AI Browsers Atlas and Comet Found Vulnerable to Sidebar Spoofing Attacks
Researchers have uncovered a new exploit that targets the AI-powered browsers Atlas by OpenAI and Comet by Perplexity, showing how attackers can create fake AI sidebars indistinguishable from the real interface to deliver malicious commands. The vulnerability—dubbed AI Sidebar Spoofing —was demonstrated by cybersecurity firm SquareX, which found that a rogue browser extension could overlay a counterfeit sidebar capable of intercepting every user interaction. The spoof mimic
Oct 24, 2025


Hidden backdoors, sloppy fixes: new TP-Link flaws let researchers — and attackers — root routers
Researchers at Forescout’s Vedere Labs say they’ve pulled open a fresh set of dangerous doors in TP-Link’s Omada and Festa VPN appliances — two newly cataloged vulnerabilities that let an attacker execute shell commands as root and resurrect a patched debug backdoor. The duo of flaws, tracked as CVE-2025-7850 and CVE-2025-7851 , expose an uncomfortable truth: incremental patches that don’t remove legacy developer features can create new, high-severity attack paths. The most
Oct 24, 2025


RecordPoint Acquires Redactive to Supercharge AI Data Governance Expansion
RecordPoint , the Australian-born data governance company trusted by global banks and regulators, has snapped up Redactive , a rising star in AI-driven data discovery and classification. The acquisition, announced October 21, underscores the rapid convergence of AI innovation and enterprise-grade data governance as organizations grapple with managing explosive data growth under tightening compliance regimes. AI for the Era of Data Deluge Founded just 18 months ago, Redactive
Oct 24, 2025


Hypori Expands Virtual Mobile Platform with Secure Messaging for Defense, Healthcare, and Enterprise Clients
Hypori is taking another step toward redefining mobile security. The company—long recognized for its zero-trust virtual mobile infrastructure (VMI)—has launched Hypori Secure Messaging , a communications solution designed for environments where privacy, compliance, and auditability aren’t optional. Replacing Shadow IT with Mission-Ready Messaging For years, agencies and enterprises have relied on consumer-grade apps like Signal or WhatsApp for quick communication, often crea
Oct 22, 2025
bottom of page