Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Author: gurushyam.mony

VigilantAI > Articles by: gurushyam.mony

Author: gurushyam.mony

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Researchers Uncover Hijack Loader Malware Using Stolen Code-Signing Certificates

  • gurushyam.mony
  • October 21, 2024
  • No Comments

China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns

  • gurushyam.mony
  • October 21, 2024
  • No Comments

The Rise of Zero-Day Vulnerabilities: Why Traditional Security Solutions Fall Short

  • gurushyam.mony
  • October 21, 2024
  • No Comments

New Linux Variant of FASTCash Malware Targets Payment Switches in ATM Heists

  • gurushyam.mony
  • October 21, 2024
  • No Comments

New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT

  • gurushyam.mony
  • October 21, 2024
  • No Comments

TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns

  • gurushyam.mony
  • October 21, 2024
  • No Comments

CISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability

  • gurushyam.mony
  • October 21, 2024
  • No Comments

GitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Access

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack

  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next

Recent Posts

  • Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspects
  • U.S. Agencies Warn of Rising Iranian Cyberattacks on Defense, OT Networks, and Critical Infrastructure
  • Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks
  • ⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more
  • Leveraging Credentials As Unique Identifiers: A Pragmatic Approach To NHI Inventories 

Recent Comments

No comments to show.

Explore Categories

  • Blog 1,256

Recent Posts

img

U.S. Agencies Warn of Rising Iranian

June 30, 2025
img

Europol Dismantles $540 Million Cryptocurrency Fraud

June 30, 2025
img

Blind Eagle Uses Proton66 Hosting for

June 30, 2025
img

⚡ Weekly Recap: Airline Hacks, Citrix

June 30, 2025

RSS Cyber Security

  • Staying Safe on Social Media in the Age of AI June 30, 2025
    Social media has become a daily part of life for billions worldwide. It connects us, informs us, and entertains us. Yet as artificial intelligence (AI) grows more advanced, the risks we face online have multiplied.   Deepfakes, AI-generated scams, and new attack methods exploit our trust and carelessness. The importance of knowing about these threats and […]
    Kirsten Doyle
  • Notorious Hacker “IntelBroker” Charged in $25 Million Global Cybercrime Spree June 30, 2025
    A British national accused of operating under the alias “IntelBroker” has been charged in the U.S. with a sweeping cybercrime campaign that caused more than $25 million in damages worldwide.  Kai West, 25, allegedly led a prolific hacking operation that targeted over 40 organizations, including a U.S. telecom provider, a municipal health agency, and an […]
    Kirsten Doyle
  • Cisco Patches Critical Flaws in ISE and ISE-PIC That Allow Root Access June 30, 2025
    Cisco has released urgent security fixes for two vulnerabilities affecting its Identity Services Engine (ISE) and Passive Identity Connector (ISE-PIC). Both flaws, CVE-2025-20281 and CVE-2025-20282, carry a CVSS severity rating of 10.0.   Through this exploit, an attacker could gain root access to systems that control identity and access management. Access would enable lateral movement, privilege […]
    Kirsten Doyle
  • Ahold Delhaize USA Confirms Data Breach Affected 2.2 Million People June 30, 2025
    Ahold Delhaize USA has confirmed that personal, financial, and health information belonging to over 2.2 million individuals was compromised during a cybersecurity breach in November last year.  Details of the breach were formally disclosed in a filing with the Maine Attorney General’s office on 26 June 2025. The incident, attributed to an external system intrusion, […]
    Kirsten Doyle
  • AI-Powered Cyberattacks Surge as IT Teams Struggle to Adapt June 30, 2025
    Cybercriminals are no longer just guessing passwords; they’re mimicking CEOs, cracking login credentials with machine learning, and flooding inboxes with synthetic spear-phishing emails. A new report from Frontegg reveals that artificial intelligence is not just shaping the cybersecurity landscape, it’s inventing entirely new forms of attack, and IT teams are struggling to keep pace.   New […]
    Josh Breaker Rolfe
  • Going SIEM-less in 2025: A Smarter Path for Resource-Constrained IT Teams June 27, 2025
    Threats keep evolving, but budgets aren’t keeping pace. In fact, 51% of respondents to ISACA’s State of Cybersecurity 2024 report say that their cyber budgets are underfunded. For organizations dealing with these constraints, traditional enterprise tools like SIEM (Security Information and Event Management) systems can be more of a burden than a benefit. This is […]
    Ted Gruenloh
  • New Malware Tries and Fails to Fool AI Detection Tools June 27, 2025
    Cybersecurity researchers at Check Point Software have identified what may be the first ever attempt by malware to manipulate AI-based security systems using prompt injection. While the tactic ultimately failed, the incident could be a sign of what’s to come: attackers targeting the artificial intelligence tools defenders now rely on.   The malware, uploaded anonymously from […]
    Josh Breaker Rolfe
  • Commercial Software’s Seven Deadly Sins June 26, 2025
    After two decades leading enterprise security across critical infrastructure and technology sectors, I’ve observed a dangerous pattern in how we discuss software supply chain attacks. The conversation focuses almost exclusively on risks hiding within open-source software packages. We’ve seen this firsthand through incidents where cybercriminals and nation-state actors leverage open-source code and platforms to their […]
    Saša Zdjelar
  • Recognizing and Avoiding Common Social Engineering Tactics June 25, 2025
    When you say the word “cyberattack,” most businesses automatically relate it to the aftermath of high-profile security breaches like ransomware or denial of service (DoS) attacks. Those immensely disruptive attacks can lead to organizations halting overnight and causing irreparable damage to their systems and reputation. If you think of the severity of these types of […]
    Nazy Fouladirad
  • Thousands of UK Government Devices Lost or Stolen, Raising Cybersecurity Fears June 24, 2025
    More than 2,000 government-issued laptops, phones and tablets were lost or stolen across Whitehall departments over the past year, as reported by The Guardian. The estimated replacement cost? £1.3 million. The broader cost to national security is a lot harder to calculate.  Departments including the Ministry of Defence (MoD), the Department for Work and Pensions, […]
    Kirsten Doyle

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc