Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Author: gurushyam.mony

VigilantAI > Articles by: gurushyam.mony

Author: gurushyam.mony

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Google Joins Forces with GASA and DNS RF to Tackle Online Scams at Scale

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Firefox Zero-Day Under Attack: Update Your Browser Immediately

  • gurushyam.mony
  • October 21, 2024
  • No Comments

CISA Warns of Critical Fortinet Flaw as Palo Alto and Cisco Issue Urgent Security Patches

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Cybercriminals Use Unicode to Hide Mongolian Skimmer in E-Commerce Platforms

  • gurushyam.mony
  • October 21, 2024
  • No Comments

6 Simple Steps to Eliminate SOC Analyst Burnout

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Experts Warn of Critical Unpatched Vulnerability in Linear eMerge E3 Systems

  • gurushyam.mony
  • October 21, 2024
  • No Comments

OpenAI Blocks 20 Global Malicious Campaigns Using AI for Cybercrime and Disinformation

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Bohemia and Cannabia Dark Web Markets Taken Down After Joint Police Operation

  • gurushyam.mony
  • October 21, 2024
  • No Comments

New Critical GitLab Vulnerability Could Allow Arbitrary CI/CD Pipeline Execution

  • 1
  • 2
  • 3
  • …
  • 5
  • Next

Recent Posts

  • FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social Engineering
  • GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Tool
  • Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns
  • Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign
  • PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack

Recent Comments

No comments to show.

Explore Categories

  • Blog 1,251

Recent Posts

img

FBI Warns of Scattered Spider’s Expanding

June 28, 2025
img

GIFTEDCROOK Malware Evolves: From Browser Stealer

June 28, 2025
img

Facebook’s New AI Tool Asks to

June 28, 2025
img

Over 1,000 SOHO Devices Hacked in

June 27, 2025

RSS Cyber Security

  • Going SIEM-less in 2025: A Smarter Path for Resource-Constrained IT Teams June 27, 2025
    Threats keep evolving, but budgets aren’t keeping pace. In fact, 51% of respondents to ISACA’s State of Cybersecurity 2024 report say that their cyber budgets are underfunded. For organizations dealing with these constraints, traditional enterprise tools like SIEM (Security Information and Event Management) systems can be more of a burden than a benefit. This is […]
    Ted Gruenloh
  • New Malware Tries and Fails to Fool AI Detection Tools June 27, 2025
    Cybersecurity researchers at Check Point Software have identified what may be the first ever attempt by malware to manipulate AI-based security systems using prompt injection. While the tactic ultimately failed, the incident could be a sign of what’s to come: attackers targeting the artificial intelligence tools defenders now rely on.   The malware, uploaded anonymously from […]
    Josh Breaker Rolfe
  • Commercial Software’s Seven Deadly Sins June 26, 2025
    After two decades leading enterprise security across critical infrastructure and technology sectors, I’ve observed a dangerous pattern in how we discuss software supply chain attacks. The conversation focuses almost exclusively on risks hiding within open-source software packages. We’ve seen this firsthand through incidents where cybercriminals and nation-state actors leverage open-source code and platforms to their […]
    Saša Zdjelar
  • Recognizing and Avoiding Common Social Engineering Tactics June 25, 2025
    When you say the word “cyberattack,” most businesses automatically relate it to the aftermath of high-profile security breaches like ransomware or denial of service (DoS) attacks. Those immensely disruptive attacks can lead to organizations halting overnight and causing irreparable damage to their systems and reputation. If you think of the severity of these types of […]
    Nazy Fouladirad
  • Thousands of UK Government Devices Lost or Stolen, Raising Cybersecurity Fears June 24, 2025
    More than 2,000 government-issued laptops, phones and tablets were lost or stolen across Whitehall departments over the past year, as reported by The Guardian. The estimated replacement cost? £1.3 million. The broader cost to national security is a lot harder to calculate.  Departments including the Ministry of Defence (MoD), the Department for Work and Pensions, […]
    Kirsten Doyle
  • North Korean APT Impersonates Zoom to Breach Canadian Gambling Firm June 24, 2025
    A Canadian online gambling provider has fallen victim to a highly targeted cyberattack involving a fake Zoom support tool, part of a broader social engineering campaign orchestrated by BlueNoroff, a financially motivated North Korean APT subgroup tied to the Lazarus Group.  Investigators from Field Effect Analysis revealed that the incident began on 28 May  2025, […]
    Kirsten Doyle
  • Inside the UK’s Fight Against Ransomware June 23, 2025
    “Ransomware is an existential threat for many victims today, and one that’s constantly evolving,” warned William Lyne, Head of Cyber Intelligence at the UK’s National Crime Agency (NCA), during his recent conversation with Deryck Mitchelson, CISO of Check Point Software.   Speaking at Check Point Software’s recent Cyber Leader Summit London, Lyne offered a frank assessment […]
    Josh Breaker Rolfe
  • Oxford City Council hit by cyberattack June 23, 2025
    Oxford City Council has confirmed it was the target of a cyberattack that led to the unauthorised access of personal information belonging to individuals involved in council-run elections over the past two decades.  The breach was quickly detected by the council’s automated security systems. It triggered an immediate response that limited the threat attackers’ access. […]
    Kirsten Doyle
  • Aflac Confirms Breach Amid Surge in Attacks on Insurance Sector June 23, 2025
    American insurance giant Aflac has disclosed a cyberattack on its U.S. network, part of what it describes as a broader campaign targeting the insurance sector. The intrusion was detected on 12 June and stopped within hours, with no ransomware deployed and no disruption to operations.  The company says it remains fully operational and continues to […]
    Kirsten Doyle
  • Charlotte Wilson on AI, Diversity, and Inclusivity June 20, 2025
    In this leadership spotlight, Charlotte Wilson, Head of Enterprise and Strategic Sales at Check Point Software, talks to Information Security Buzz about the importance of diversity and inclusivity in the AI era. AI is an inescapable facet of modern cybersecurity. But unless we actively address bias and representation, it could entrench inequalities in the very […]
    Josh Breaker Rolfe

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc