Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Author: gurushyam.mony

VigilantAI > Articles by: gurushyam.mony

Author: gurushyam.mony

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Google Joins Forces with GASA and DNS RF to Tackle Online Scams at Scale

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Firefox Zero-Day Under Attack: Update Your Browser Immediately

  • gurushyam.mony
  • October 21, 2024
  • No Comments

CISA Warns of Critical Fortinet Flaw as Palo Alto and Cisco Issue Urgent Security Patches

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Cybercriminals Use Unicode to Hide Mongolian Skimmer in E-Commerce Platforms

  • gurushyam.mony
  • October 21, 2024
  • No Comments

6 Simple Steps to Eliminate SOC Analyst Burnout

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Experts Warn of Critical Unpatched Vulnerability in Linear eMerge E3 Systems

  • gurushyam.mony
  • October 21, 2024
  • No Comments

OpenAI Blocks 20 Global Malicious Campaigns Using AI for Cybercrime and Disinformation

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Bohemia and Cannabia Dark Web Markets Taken Down After Joint Police Operation

  • gurushyam.mony
  • October 21, 2024
  • No Comments

New Critical GitLab Vulnerability Could Allow Arbitrary CI/CD Pipeline Execution

  • 1
  • 2
  • 3
  • …
  • 5
  • Next

Recent Posts

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • Securing the Mid-Market Across the Complete Threat Lifecycle
  • ⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats

Recent Comments

No comments to show.

Explore Categories

  • Blog 2,307

Recent Posts

img

Researchers Find 341 Malicious ClawHub Skills

February 02, 2026
img

OpenClaw Bug Enables One-Click Remote Code

February 02, 2026
img

Microsoft Begins NTLM Phase-Out With Three-Stage

February 02, 2026
img

Securing the Mid-Market Across the Complete

February 02, 2026

RSS Cyber Security

  • Balancing Identity and Data Security in 2026: Why a Two-Pillar Strategy Matters February 2, 2026
    Security teams entering 2026 face a familiar truth dressed in new clothes. The technologies change, the tools get smarter, but most compromises still trace back to two core areas of any organization: identity and data. Securing them with separate programs is an invitation to gaps and blind spots. Treating them as the two columns that […]
    Dirk Schrader
  • Data Privacy Week 2026: Why Good Intentions Are No Longer Enough January 30, 2026
    It’s Data Privacy Week, the annual international awareness initiative from the National Cybersecurity Alliance (NCA) aimed at empowering individuals and businesses to value individual privacy, safeguard data, and build trust.  “Your online activities generate a treasure trove of data – from your interests to your purchases, as well as your online behaviors, and it is collected by websites, apps, […]
    Kirsten Doyle
  • Sextortion and the Psychology of Fear: How Scammers Are Targeting Teenagers January 28, 2026
    Sextortion is a form of extortion or blackmail in which a criminals threaten to share private or intimate information or images unless a victim gives them money. Criminals can get hold of these images by compromising credentials or coercing someone into sending the images or create deepfakes (i.e., images created with the help of AI) […]
    Martina Dove
  • Expert Panel: Cyber Ready for 2026, Or Just Confident on Paper? January 28, 2026
    Many organizations entering 2026 do not feel they have fallen behind in their overall cyber-readiness. In fact, several believe they are doing everything right.   They now have a wide range of new tools, greater visibility into how their systems operate, an almost endless array of metrics to measure performance, and more compliance certifications than ever before.  With […]
    Kirsten Doyle
  • From Surveillance to Control: Evolving Beyond Session Recording in PAM January 26, 2026
    There was a time when the standard for privileged access management (PAM) programs was simple: record everything. The idea was that by capturing all privileged sessions, teams would have a record of all activity, the good, the bad, and the ugly, along with assurances that it would help businesses in regulated industries satisfy all audit […]
    Art Poghosyan
  • Researchers Show How Calendar Invites Can Be Weaponized in Google Gemini January 23, 2026
    Security researchers at Miggo, have disclosed a vulnerability in Google’s Gemini assistant that allowed a standard calendar invitation to be used as an attack vector, exposing private meeting data through a form of prompt injection that relied entirely on natural language.  The issue was discovered by a research team led by Liad Eliyahu, head of research, and was […]
    Kirsten Doyle
  • OWASP Top 10 2025: New Enemies, Old Foes, and an Approach to Vulnerability Remediation That Must Evolve January 22, 2026
    The OWASP Foundation has been a guiding light for security professionals and enthusiasts alike, providing critical, practical advice on the most insidious software vulnerabilities across a plethora of categories and platforms. It has been the first major update since 2021 to the flagship OWASP Top 10 Web Vulnerabilities, and in that time, the industry has […]
    Matias Madou
  • ReliaQuest Uncovers Social Media Phishing Campaign Built on Trusted Tools January 22, 2026
    ReliaQuest has investigated a phishing campaign that exploited private messages in social media to deliver weaponized files via DLL sideloading, as well as a legitimate, open-source Python pen-testing script. The company says the aim was more than likely to deploy a remote access trojan (RAT).  This approach enables bad actors to bypass detection and scale their […]
    Kirsten Doyle
  • How to Assess Vendor Cybersecurity Hygiene Before Onboarding January 22, 2026
    Third-party vendors help your organization scale by running key systems and providing specialized tools. Although they add valuable capabilities, each new integration, login, and data flow also expands your organization’s attack surface. Vendor due diligence works best when it is repeatable, evidence-based, and proportional to the access the provider will have. These seven practical steps […]
    Zac Amos
  • Apple Supplier Luxshare Allegedly Hit by Ransomware, Customer R&D Data Leaked January 21, 2026
    Luxshare Precision Industry, a major Chinese electronics manufacturer and key Apple supplier, is alleged to have been hit by a ransomware attack in December.   Bad actors are claiming they encrypted company systems and exfiltrated sensitive data linked to multiple customers.  R&D data samples were leaked as proof by RansomHouse.   They said: “Dear management of Luxshare Precision Industy Co. Ltd. We were waiting for you for quite […]
    Kirsten Doyle

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc