Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Author: gurushyam.mony

VigilantAI > Articles by: gurushyam.mony

Author: gurushyam.mony

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Google Joins Forces with GASA and DNS RF to Tackle Online Scams at Scale

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Firefox Zero-Day Under Attack: Update Your Browser Immediately

  • gurushyam.mony
  • October 21, 2024
  • No Comments

CISA Warns of Critical Fortinet Flaw as Palo Alto and Cisco Issue Urgent Security Patches

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Cybercriminals Use Unicode to Hide Mongolian Skimmer in E-Commerce Platforms

  • gurushyam.mony
  • October 21, 2024
  • No Comments

6 Simple Steps to Eliminate SOC Analyst Burnout

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Experts Warn of Critical Unpatched Vulnerability in Linear eMerge E3 Systems

  • gurushyam.mony
  • October 21, 2024
  • No Comments

OpenAI Blocks 20 Global Malicious Campaigns Using AI for Cybercrime and Disinformation

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Bohemia and Cannabia Dark Web Markets Taken Down After Joint Police Operation

  • gurushyam.mony
  • October 21, 2024
  • No Comments

New Critical GitLab Vulnerability Could Allow Arbitrary CI/CD Pipeline Execution

  • 1
  • 2
  • 3
  • …
  • 5
  • Next

Recent Posts

  • Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild
  • Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads
  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
  • Securing GenAI in the Browser: Policy, Isolation, and Data Controls That Actually Work
  • React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation

Recent Comments

No comments to show.

Explore Categories

  • Blog 2,070

Recent Posts

img

Apple Issues Security Updates After Two

December 13, 2025
img

Fake OSINT and GPT Utility GitHub

December 12, 2025
img

New Advanced Phishing Kits Use AI

December 12, 2025
img

Securing GenAI in the Browser: Policy,

December 12, 2025

RSS Cyber Security

  • The Year the Attack Surface Outgrew Our Assumptions December 12, 2025
    If the first part of our expert predictions series showed us how fast the threat landscape is shifting, part two shows us what happens when that shift becomes structural. Across this next set of expert insights, a pattern can be seen: the attack surface is no longer something organizations “manage”, it’s something that is growing on its […]
    Kirsten Doyle
  • Hexnode CEO on Tackling Alert Fatigue Before It Derails SME Security December 12, 2025
    As of mid-2025, more than 21,500 Common Vulnerabilities and Exposures (CVEs) have been catalogued, which is a staggering 16-18% increase from the previous year. If this pace holds, experts predict we could face an overwhelming 50,000 disclosed vulnerabilities globally by the close of the year. This translates to security teams waking up to over 130 […]
    Apu Pavithran
  • Unprotected MongoDB Exposes Over 4 Billion Records December 11, 2025
    An unprotected MongoDB database exposing over 4 billion records, revealing 16 terabytes of professional and corporate intelligence data, has been discovered by researchers at the Cybernews research team and SecurityDiscovery.com.  The database exposed detailed LinkedIn-derived profiles, contact information, corporate relationships, and employment histories, alongside other personal information.  There were nine collections within the dataset, with each file name indicating the type of […]
    Kirsten Doyle
  • Trump Drafts AI Order to Override State AI Laws December 11, 2025
    US President Donald Trump says he will sign an executive order this week meant to create a single national rulebook for AI in the country, replacing a patchwork of different state laws.   “There must be only One Rulebook if we are going to continue to lead in AI. We are beating ALL COUNTRIES at this point in the race, […]
    Kirsten Doyle
  • 2026: The Year Cybersecurity Hits Its Turning Point December 10, 2025
    If there’s one common threat in every expert prediction for 2026, it’s this: the ground is shifting faster than most organizations realize. AI has moved from a “trend” sitting neatly on a roadmap, to a technology embedded in every part of the threat landscape. It is reshaping attacker behavior, stretching defensive playbooks, and exposing gaps we’ve been slow to confront.   At the same […]
    Kirsten Doyle
  • Barts Health NHS Confirms Cl0p Breach December 9, 2025
    Barts Health, the UK’s largest NHS trust, which runs five major hospitals across London, has confirmed that patient and staff data was stolen in ransomware gang Cl0p‘s mass-exploitation of Oracle’s EBS.  “We are taking urgent action and seeking a High Court order to ban the publication, use or sharing of this data by anyone,” Barts […]
    Kirsten Doyle
  • Gartner Advises Organizations to Block AI-Powered Agentic Browsers For Now December 9, 2025
    A Gartner report is recommending companies to block AI-powered “agentic browsers” due to severe security risks, including data leaks to cloud systems, prompt injection vulnerabilities, and potential for malicious manipulation.    The analyst giant’s advisory said organizations should block AI browsers for now due to significant security risks, mostly because their default settings prioritize user experience and automation […]
    Kirsten Doyle
  • Cybersecurity and the Power of Words: Why Security Must Be in Our DNA December 8, 2025
    How many times have you caught yourself humming a song you heard years ago? Or woken up with a melody stuck in your head? I’m guessing the answer is “many.” Now, how many times have you hummed something about cybersecurity? Some songs are so deeply embedded in our collective consciousness that we can sing them […]
    Anastasios Arampatzis
  • How to Implement a Zero-Trust Security Framework to Protect Patient Data December 8, 2025
    Health care cybersecurity has never been more critical, with the industry facing a seemingly endless barrage of cyberattacks. Cybercriminals are exploiting even the smallest vulnerabilities to slip in unnoticed. With so much at stake, implementing a zero-trust security framework is crucial. Establishing a Zero-Trust Architecture Zero trust assumes the network has no traditional edge — […]
    Emily Newton
  • ISC2 2025 Workforce Study: Stable Budgets, Growing Cybersecurity Skills Gap December 5, 2025
    ISC2 has released its 2025 Cybersecurity Workforce Study, and while the economic headwinds that battered security teams last year appear to be stabilizing, the industry’s skills gap is getting worse.   The report, based on responses from more than 16,000 cybersecurity professionals, indicates that layoffs and budget cuts have ceased to accelerate.   Reports of budget cuts (36%) and […]
    Kirsten Doyle

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc