top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


The New King of Ransonware
Qilin’s Explosive Reign and What It Means for Critical Infrastructure Ten months into 2025, the ransomware group Qilin has hit a grim milestone: its 700th claimed victim . That makes it the most prolific ransomware outfit of the year—eclipsing last year’s leader, RansomHub, which logged 547 total victims in 2024. Once a fringe player in the cybercrime underground, Qilin now dominates the ransomware-as-a-service (RaaS) market, turning data extortion into an industrialized bus
Oct 29


AI Lobby Readies Major Ad Blitz to Push for Federal Regulation—and Undercut State Efforts
The artificial intelligence industry is gearing up for a political power play. Flush with record funding and influence, AI companies are pooling millions into Build American AI , a new nonprofit advocacy group that will launch an eight-figure advertising campaign to steer public opinion—and lawmakers—toward federal regulation of AI. The Rise of a Shadow Lobby Build American AI is an offshoot of Leading the Future , a well-funded pro-AI super PAC that plans to spend tens of mi
Oct 29


Darktrace Expands to Riyadh as AI Cybersecurity Demand Surges Across the Middle East
Darktrace is doubling down on the Middle East. The British-born cybersecurity company—known for pioneering AI systems that autonomously detect and respond to cyber threats—announced it will establish a legal entity and new regional office in Riyadh, Saudi Arabia , marking a significant milestone in its global expansion strategy. The office, located in Riyadh’s landmark Kingdom Centre , will open in January 2026 , serving as a new regional hub for customers across Saudi Arabi
Oct 28


Toxic Combinations: The Hidden Catalyst Behind 70 % of Today’s Major Breaches
In the evolving theatre of cyber-conflict, large-scale breaches are no longer just the result of a single dramatic failure—now they are nearly always the result of many smaller failures colliding. According to recent analysis by Panaseer —a specialist in continuous controls monitoring—the statistic that sets the alarm bells ringing is stark: 70 % of major breaches stem from “toxic combinations” of overlapping cybersecurity risks. Understanding the domino effect The term toxi
Oct 28


The Password Reuse Crisis Hits a New High: 183 Million Credentials Dumped from Malware Stealer Logs
Password reuse just became a lot more dangerous. In what may be one of the largest credential-harvesting operations ever documented, threat actors have compiled 3.5 terabytes of stolen login data—now labeled the “Synthient Stealer Log Threat Data”—and it’s been added to Have I Been Pwned (HIBP). The dataset includes 183 million unique email addresses, each paired with the passwords and websites where they were stolen. For the average person juggling dozens of logins across a
Oct 28


Human Trust: The New Frontier in Data Extortion
When high-profile campaigns by groups like LAPSUS$ and Scattered Spider make headlines, they often leave the strong impression of technical wizardry: zero-days, clever malware, intricate breaches. But according to research from Flashpoint , that narrative misses the more profound evolution underway. Gone are the days when data extortion simply meant bulk-stealing databases: the playbook has matured to target the single most vulnerable link in modern enterprise security— human
Oct 28
bottom of page