Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Author: gurushyam.mony

VigilantAI > Articles by: gurushyam.mony

Author: gurushyam.mony

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Google Joins Forces with GASA and DNS RF to Tackle Online Scams at Scale

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Firefox Zero-Day Under Attack: Update Your Browser Immediately

  • gurushyam.mony
  • October 21, 2024
  • No Comments

CISA Warns of Critical Fortinet Flaw as Palo Alto and Cisco Issue Urgent Security Patches

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Cybercriminals Use Unicode to Hide Mongolian Skimmer in E-Commerce Platforms

  • gurushyam.mony
  • October 21, 2024
  • No Comments

6 Simple Steps to Eliminate SOC Analyst Burnout

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Experts Warn of Critical Unpatched Vulnerability in Linear eMerge E3 Systems

  • gurushyam.mony
  • October 21, 2024
  • No Comments

OpenAI Blocks 20 Global Malicious Campaigns Using AI for Cybercrime and Disinformation

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Bohemia and Cannabia Dark Web Markets Taken Down After Joint Police Operation

  • gurushyam.mony
  • October 21, 2024
  • No Comments

New Critical GitLab Vulnerability Could Allow Arbitrary CI/CD Pipeline Execution

  • 1
  • 2
  • 3
  • …
  • 5
  • Next

Recent Posts

  • Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts
  • Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks
  • Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries
  • Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers
  • From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation

Recent Comments

No comments to show.

Explore Categories

  • Blog 1,765

Recent Posts

img

Experts Warn of Widespread SonicWall VPN

October 11, 2025
img

Hackers Turn Velociraptor DFIR Tool Into

October 11, 2025
img

Microsoft Warns of ‘Payroll Pirates’ Hijacking

October 10, 2025
img

Stealit Malware Abuses Node.js Single Executable

October 10, 2025

RSS Cyber Security

  • The Shadow AI Identity Crisis October 3, 2025
    AI agents are no longer just a conceptual risk; they’ve landed and are storming the beach. From drafting code to executing business logic, these agents are autonomous and increasingly embedded into enterprise workflows. Tasked with responsibilities once reserved for humans, this growing class of shadow identities is acting with wide-ranging access, little oversight, and no […]
    Eric Olden
  • The AI Democracy: How Defenders Can Thwart Attackers October 3, 2025
    AI has transmuted the game for attackers and defenders within the past three years. Threat actors haven’t hesitated to adopt AI-powered methods. Defenders have the opportunity to respond in kind with AI-powered solutions. While emerging on the market, these solutions have yet to be adopted across the board. However, given the risks created by large […]
    Katrina Thompson
  • Red Hat OpenShift AI Vulnerability Allows Attackers to Seize Infrastructure Control October 3, 2025
    A newly disclosed security flaw in Red Hat Open Shift AI could allow attackers to escalate privileges and seize control of entire infrastructures – albeit under specific conditions. Tracked as CVE-2025-10725, the vulnerability carries a CVSS score of 9.9 out of 10, falling just short of the maximum severity rating.   Red Hat has classified the […]
    Josh Breaker Rolfe
  • Beyond Phishing: Why AI Is Critical in BEC Detection and Forensics October 2, 2025
    Although business email compromise (BEC) and phishing are often included in the same breath, their differences extend beyond how they are launched to how they are caught.   BEC requires deeper context-aware detection than basic phishing tools provide, and AI delivers that.   BEC vs. Phishing: The Security Perspective  From a practitioner’s point of view, stopping a […]
    Katrina Thompson
  • Why ROT is a Risk Enterprises Shouldn’t Ignore October 2, 2025
    While most enterprises have made ongoing investments in their tech infrastructure and processes to wring out vulnerabilities, many organisations are unknowingly clinging to a habit that’s quietly undermining their security posture: hoarding redundant, obsolete, and trivial (ROT) data. This forgotten clutter—scattered across servers, cloud drives, and legacy systems—serves no business purpose. However, it does some […]
    Manuel Sanchez
  • Cyberattack Halts Asahi Group’s Operations in Japan October 1, 2025
    Japan’s leading beverage company, Asahi, has suffered a significant disruption to its operations following a cyberattack that began on 29 September 2025.   The attack has led to a complete system failure, halting production, order processing, shipping, and customer service activities across the company’s Japanese operations.   Asahi said that there has been no confirmed leakage of […]
    Kirsten Doyle
  • Phantom Taurus: A New Face in Chinese Espionage October 1, 2025
    Researchers from Palo Alto’s Unit 42 say a suspected group of Chinese actors infiltrated email servers used by foreign ministries. The attackers accessed Microsoft Exchange systems and combed through messages related to diplomatic activities.  The threat, dubbed “Phantom Taurus” targets governments and telecoms across Africa, the Middle East, and Asia. Its operations align closely with […]
    Kirsten Doyle
  • AI Agents Open a New Front in Cybersecurity: ForcedLeak in Salesforce Agentforce September 30, 2025
    Noma Labs has uncovered a severe flaw in Salesforce’s Agentforce platform. The chain of vulnerabilities, dubbed ForcedLeak, carried a CVSS score of 9.4 and exposed customer data to theft through indirect prompt injection and a loophole in Salesforce’s Content Security Policy.  The weakness lay in how Agentforce (an autonomous AI agent) processed instructions. Unlike conventional […]
    Kirsten Doyle
  • Harrods Will Not Engage with Its Attackers September 30, 2025
    Harrods says attackers made contact after a breach compromised data belonging to 430,000 customers. The luxury department store said it will not be engaging with them.    The information was taken from a third-party provider. In a statement, Harrods said: “We proactively informed affected e-commerce customers on Friday that the impacted personal data is limited to […]
    Kirsten Doyle
  • Federal Agencies Scramble as Cisco Firewall Flaws Are Exploited September 29, 2025
    Federal civilian agencies must immediately patch critical Cisco firewall vulnerabilities being exploited by an “advanced threat actor.”   The Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive ordering immediate action.  The vulnerabilities (CVE-2025-20333 and CVE-2025-20362) affect Cisco Adaptive Security Appliances (ASA). One allows remote code execution, the other privilege escalation.   Bad actors have been […]
    Kirsten Doyle

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc