top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Aftermarket Infotainment Systems in Cars Can Be Turned into Surveillance Tools
Researchers Alex Plaskett and McCaulay Hudson from NCC Group recently demonstrated how an attacker could use zero-day vulnerabilities in...
Mar 13


Russia’s ‘Pravda’ Disinformation Network is Poisoning Western AI Models
A well-funded Moscow-based propaganda machine has successfully infiltrated leading artificial intelligence models, flooding Western AI...
Mar 10


Chinese Espionage Group Silk Typhoon Adopts New Tactics to Exploit IT Solutions
Microsoft Threat Intelligence has sounded the alarm on a critical shift in cyber threat tactics employed by Silk Typhoon, a...
Mar 6


Typosquatting Campaign Hits Go Ecosystem: Malicious Packages Target Developers with Hidden Malware
A newly uncovered typosquatting campaign is actively targeting developers in the Go ecosystem, embedding stealthy malware within...
Mar 6


Ransomware Surge in February 2025: Clop, RansomHub, and Medusa Lead a Relentless Onslaught
February may be the shortest month of the year, but it packed a devastating punch in the world of cybercrime. According to a recent...
Mar 6


Microsoft Dismantles Massive GitHub-Based Malvertising Operation Impacting Nearly One Million Devices
Microsoft has moved swiftly to dismantle a vast malvertising campaign that leveraged GitHub repositories to distribute malware to nearly...
Mar 6
bottom of page