Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Author: gurushyam.mony

VigilantAI > Articles by: gurushyam.mony

Author: gurushyam.mony

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Researchers Uncover Hijack Loader Malware Using Stolen Code-Signing Certificates

  • gurushyam.mony
  • October 21, 2024
  • No Comments

China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns

  • gurushyam.mony
  • October 21, 2024
  • No Comments

The Rise of Zero-Day Vulnerabilities: Why Traditional Security Solutions Fall Short

  • gurushyam.mony
  • October 21, 2024
  • No Comments

New Linux Variant of FASTCash Malware Targets Payment Switches in ATM Heists

  • gurushyam.mony
  • October 21, 2024
  • No Comments

New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT

  • gurushyam.mony
  • October 21, 2024
  • No Comments

TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns

  • gurushyam.mony
  • October 21, 2024
  • No Comments

CISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability

  • gurushyam.mony
  • October 21, 2024
  • No Comments

GitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Access

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack

  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next

Recent Posts

  • Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups
  • Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes
  • Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days
  • Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws
  • North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware

Recent Comments

No comments to show.

Explore Categories

  • Blog 2,053

Recent Posts

img

Webinar: How Attackers Exploit Cloud Misconfigurations

December 10, 2025
img

Warning: WinRAR Vulnerability CVE-2025-6218 Under Active

December 10, 2025
img

Microsoft Issues Security Fixes for 56

December 10, 2025
img

Fortinet, Ivanti, and SAP Issue Urgent

December 10, 2025

RSS Cyber Security

  • 2026: The Year Cybersecurity Hits Its Turning Point December 10, 2025
    If there’s one common threat in every expert prediction for 2026, it’s this: the ground is shifting faster than most organizations realize. AI has moved from a “trend” sitting neatly on a roadmap, to a technology embedded in every part of the threat landscape. It is reshaping attacker behavior, stretching defensive playbooks, and exposing gaps we’ve been slow to confront.   At the same […]
    Kirsten Doyle
  • Barts Health NHS Confirms Cl0p Breach December 9, 2025
    Barts Health, the UK’s largest NHS trust, which runs five major hospitals across London, has confirmed that patient and staff data was stolen in ransomware gang Cl0p‘s mass-exploitation of Oracle’s EBS.  “We are taking urgent action and seeking a High Court order to ban the publication, use or sharing of this data by anyone,” Barts […]
    Kirsten Doyle
  • Gartner Advises Organizations to Block AI-Powered Agentic Browsers For Now December 9, 2025
    A Gartner report is recommending companies to block AI-powered “agentic browsers” due to severe security risks, including data leaks to cloud systems, prompt injection vulnerabilities, and potential for malicious manipulation.    The analyst giant’s advisory said organizations should block AI browsers for now due to significant security risks, mostly because their default settings prioritize user experience and automation […]
    Kirsten Doyle
  • Cybersecurity and the Power of Words: Why Security Must Be in Our DNA December 8, 2025
    How many times have you caught yourself humming a song you heard years ago? Or woken up with a melody stuck in your head? I’m guessing the answer is “many.” Now, how many times have you hummed something about cybersecurity? Some songs are so deeply embedded in our collective consciousness that we can sing them […]
    Anastasios Arampatzis
  • How to Implement a Zero-Trust Security Framework to Protect Patient Data December 8, 2025
    Health care cybersecurity has never been more critical, with the industry facing a seemingly endless barrage of cyberattacks. Cybercriminals are exploiting even the smallest vulnerabilities to slip in unnoticed. With so much at stake, implementing a zero-trust security framework is crucial. Establishing a Zero-Trust Architecture Zero trust assumes the network has no traditional edge — […]
    Emily Newton
  • ISC2 2025 Workforce Study: Stable Budgets, Growing Cybersecurity Skills Gap December 5, 2025
    ISC2 has released its 2025 Cybersecurity Workforce Study, and while the economic headwinds that battered security teams last year appear to be stabilizing, the industry’s skills gap is getting worse.   The report, based on responses from more than 16,000 cybersecurity professionals, indicates that layoffs and budget cuts have ceased to accelerate.   Reports of budget cuts (36%) and […]
    Kirsten Doyle
  • Cyber Extortion Surges as State Actors, Hacktivists, and AI Shape a Volatile 2026 Threat Landscape December 5, 2025
    Cyber extortion is on the rise. New data from the Orange Cyberdefense Security Navigator 2026, highlighted how Cy-X victims rose 44.5% year-over-year, reaching 6,142 cases between October 2024 and September 2025.   The ecosystem fueling these attacks has also expanded, with 91 distinct Cy-X brands now active, up from 76 the previous year. That growth, combined with an 18% jump in victims […]
    Kirsten Doyle
  • Widespread Microsoft Defender Outage Leaves Security Teams Flying Blind December 4, 2025
    Microsoft said it experienced a widespread outage that affected its Microsoft Defender portal, preventing many customers from accessing security alerts, device inventories, and threat-hunting dashboards.   “We’re investigating an issue where users may experience issues when trying to access the Microsoft Defender portal. Additional information will be provided in the admin center under DZ1191468,” the company said on X.  It all started when a sudden spike in […]
    Kirsten Doyle
  • Albiriox: New Android RAT Emerges, Aiming at Global Finance and Crypto December 4, 2025
    The Cleafy Threat Intelligence team has discovered a new Android malware family, called Albiriox, that is making its way across the cybercrime ecosystem.  It is offered as a full-fledged Malware-as-a-Service (MaaS) and already shows the hallmarks of modern mobile banking threats.   First noticed in September this year during a quiet recruitment phase on underground forums, the operation […]
    Kirsten Doyle
  • Proactive security is key to speeding up SME cloud modernisation December 2, 2025
    Small and mid-sized businesses across the UK are turning to the cloud to accelerate growth and improve performance. Yet, when it comes to turning that ambition into reality, confidence often falters. The challenge shifts from what to build to figuring out how to keep it secure and compliant with limited resources. That hesitation is understandable […]
    Anna Webb

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc