Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Author: gurushyam.mony

VigilantAI > Articles by: gurushyam.mony

Author: gurushyam.mony

  • gurushyam.mony
  • October 21, 2024
  • No Comments

CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance

  • gurushyam.mony
  • October 21, 2024
  • No Comments

How Hybrid Password Attacks Work and How to Defend Against Them

  • gurushyam.mony
  • October 21, 2024
  • No Comments

FBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulation

  • gurushyam.mony
  • October 21, 2024
  • No Comments

GitHub, Telegram Bots, and ASCII QR Codes Abused in New Wave of Phishing Attacks

  • gurushyam.mony
  • October 21, 2024
  • No Comments

OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Critical Veeam Vulnerability Exploited to Spread Akira and Fog Ransomware

  • gurushyam.mony
  • October 21, 2024
  • No Comments

THN Cybersecurity Recap: Top Threats, Tools and Trends (Oct 7 – Oct 13)

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems

  • gurushyam.mony
  • October 21, 2024
  • No Comments

5 Steps to Boost Detection and Response in a Multi-Layered Cloud

  • gurushyam.mony
  • October 21, 2024
  • No Comments

WordPress Plugin Jetpack Patches Major Vulnerability Affecting 27 Million Sites

  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next

Recent Posts

  • New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials
  • One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk
  • Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions
  • Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions
  • PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems

Recent Comments

No comments to show.

Explore Categories

  • Blog 2,816

Recent Posts

img

New Linux PamDOORa Backdoor Uses PAM

May 08, 2026
img

One Missed Threat Per Week: What

May 08, 2026
img

Linux Kernel Dirty Frag LPE Exploit

May 08, 2026

Linux Kernel Dirty Frag LPE Exploit

May 08, 2026

RSS Cyber Security

  • Investigating the aftermath: understanding digital forensics after a cyber incident May 7, 2026
    Successfully recovering your business from a cyberattack often requires much more than just loading up backups. Although your first instinct is likely to prioritize normal operations as quickly as possible, there’s also the important process of taking a detailed look at events before moving forward. Taking the time to investigate past events helps you understand […]
    Nazy Fouladirad
  • “Recovery Is the New Prevention”: a Q&A with CSO of Health-ISAC, Errol Weiss May 7, 2026
    Errol Weiss spent fourteen years in banking and finance before joining Health-ISAC, where he serves as Chief Security Officer.  His career has tracked a quiet but profound shift in how critical sectors think about cyber defense, away from prevention at all costs, toward resilience and rapid recovery.   In a conversation with Joe Pettit, Weiss explains why treating attacks as inevitable changes […]
    Errol Weiss and Joe Pettit
  • Trelix admits breach on a ‘portion’ of its source code repository May 7, 2026
    Trellix has disclosed unauthorized access to a portion of its source code repository.   However, it did not specify which portion of its source code was accessed, nor did it provide many further details about the incident.  “Upon learning of this matter, we immediately began working with leading forensic experts to resolve it. We have also notified law enforcement,” the company said in a statement.   Based on its investigation to date, Trellix added […]
    Kirsten Doyle
  • Security’s Blind Spot: The Threats Hiding in “Low-Severity” Alerts May 6, 2026
    Security operations centers (SOCs) operate under a difficult reality where there are far more security alerts than human analysts available to investigate them. As organizations expand their digital environments and deploy more security tools, alert volume continues to grow faster than teams can realistically manage. AI is really just another layer that accelerates the volume […]
    Mitchem Boles
  • Microsoft Edge Found Holding Saved Credentials in Plaintext Memory May 6, 2026
    Security researcher Tom Jøran Sønstebyseter Rønning, posting as @L1v1ng0ffTh3L4N, has revealed that Microsoft Edge decrypts every saved password at startup and holds all of them in process memory, in cleartext, for the entire browser session.   He says this includes passwords for sites the user is visiting as well as every credential the user’s ever saved. The passwords are held in memory from the moment Edge […]
    Kirsten Doyle
  • US weighs slashing vulnerability patching deadlines as AI-driven threats accelerate  May 6, 2026
    There are discussions in US cybersecurity circles to radically shorten the time given to government agencies to fix software vulnerabilities currently being exploited, especially amid concerns about the growing use of artificial intelligence-based attacks.  According to a report by Reuters, there are talks of reducing the time frame from the current two or three weeks down to just three days, dramatically raising the pace of defensive operations across government systems.  These conversations, initiated by CISA and the […]
    Kirsten Doyle
  • How Iranian Cyber Intrusions Unfold Inside Enterprise Networks May 5, 2026
    Iranian cyber operations have gone from being disruptive single events to ongoing campaigns against governments, infrastructure providers, technology companies, and research organizations. Their ability to operate inside the same tools and infrastructure that defenders rely on makes these intrusions difficult to detect. The stakes extend well beyond espionage. For example, in 2022, Iranian-linked attackers caused […]
    Hüseyin Can Yüceel
  • Copy Fail lands in CISA KEV as actively exploited Linux flaw threatens widespread privilege escalation May 5, 2026
    The Cybersecurity and Infrastructure Security Agency (CISA) has added another Linux kernel vulnerability, CVE-2026-31431, also known as Copy Fail, to the Known Exploited Vulnerabilities (KEVs).   Inclusion in the list implies active real-world attacks and increases the priority of patches.   This particular vulnerability, which has been affecting almost all major Linux distributions since 2017, involves transferring resources incorrectly between security domains […]
    Kirsten Doyle
  • Visual data is the blind spot in enterprise security: that’s about to change May 4, 2026
    Most enterprise security teams can tell you exactly how their databases are encrypted. They know who has access to their CRM and can pull audit logs for every sensitive document that’s been opened, copied, or shared in the last 90 days. Ask those same teams what’s happening with the thousands of hours of video footage […]
    Danielle King
  • The new rules of war have no rules April 29, 2026
    When the Iran conflict escalated the way it did, most businesses had no playbook for it. The disruption didn’t stay in the region. It showed up in energy supplies, financial systems, hospitals, and communication networks, touching organisations that had simply been going about their day. No warning, no preparation, just a sudden wave of uncertainty […]
    Dilki Rathnayake

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc