Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Author: gurushyam.mony

VigilantAI > Articles by: gurushyam.mony

Author: gurushyam.mony

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Researchers Uncover Cicada3301 Ransomware Operations and Its Affiliate Program

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Microsoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browser

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Beware: Fake Google Meet Pages Deliver Infostealers in Ongoing ClickFix Campaign

  • gurushyam.mony
  • October 21, 2024
  • No Comments

U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign

  • gurushyam.mony
  • October 21, 2024
  • No Comments

The Ultimate DSPM Guide: Webinar on Building a Strong Data Security Posture

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Acronym Overdose – Navigating the Complex Data Security Landscape

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks

  • gurushyam.mony
  • October 21, 2024
  • No Comments

North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers

  • Prev
  • 1
  • …
  • 3
  • 4
  • 5

Recent Posts

  • New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login
  • Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts
  • Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks
  • Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries
  • Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers

Recent Comments

No comments to show.

Explore Categories

  • Blog 1,766

Recent Posts

img

New Oracle E-Business Suite Bug Could

October 12, 2025
img

Experts Warn of Widespread SonicWall VPN

October 11, 2025
img

Hackers Turn Velociraptor DFIR Tool Into

October 11, 2025
img

Microsoft Warns of ‘Payroll Pirates’ Hijacking

October 10, 2025

RSS Cyber Security

  • The Shadow AI Identity Crisis October 3, 2025
    AI agents are no longer just a conceptual risk; they’ve landed and are storming the beach. From drafting code to executing business logic, these agents are autonomous and increasingly embedded into enterprise workflows. Tasked with responsibilities once reserved for humans, this growing class of shadow identities is acting with wide-ranging access, little oversight, and no […]
    Eric Olden
  • The AI Democracy: How Defenders Can Thwart Attackers October 3, 2025
    AI has transmuted the game for attackers and defenders within the past three years. Threat actors haven’t hesitated to adopt AI-powered methods. Defenders have the opportunity to respond in kind with AI-powered solutions. While emerging on the market, these solutions have yet to be adopted across the board. However, given the risks created by large […]
    Katrina Thompson
  • Red Hat OpenShift AI Vulnerability Allows Attackers to Seize Infrastructure Control October 3, 2025
    A newly disclosed security flaw in Red Hat Open Shift AI could allow attackers to escalate privileges and seize control of entire infrastructures – albeit under specific conditions. Tracked as CVE-2025-10725, the vulnerability carries a CVSS score of 9.9 out of 10, falling just short of the maximum severity rating.   Red Hat has classified the […]
    Josh Breaker Rolfe
  • Beyond Phishing: Why AI Is Critical in BEC Detection and Forensics October 2, 2025
    Although business email compromise (BEC) and phishing are often included in the same breath, their differences extend beyond how they are launched to how they are caught.   BEC requires deeper context-aware detection than basic phishing tools provide, and AI delivers that.   BEC vs. Phishing: The Security Perspective  From a practitioner’s point of view, stopping a […]
    Katrina Thompson
  • Why ROT is a Risk Enterprises Shouldn’t Ignore October 2, 2025
    While most enterprises have made ongoing investments in their tech infrastructure and processes to wring out vulnerabilities, many organisations are unknowingly clinging to a habit that’s quietly undermining their security posture: hoarding redundant, obsolete, and trivial (ROT) data. This forgotten clutter—scattered across servers, cloud drives, and legacy systems—serves no business purpose. However, it does some […]
    Manuel Sanchez
  • Cyberattack Halts Asahi Group’s Operations in Japan October 1, 2025
    Japan’s leading beverage company, Asahi, has suffered a significant disruption to its operations following a cyberattack that began on 29 September 2025.   The attack has led to a complete system failure, halting production, order processing, shipping, and customer service activities across the company’s Japanese operations.   Asahi said that there has been no confirmed leakage of […]
    Kirsten Doyle
  • Phantom Taurus: A New Face in Chinese Espionage October 1, 2025
    Researchers from Palo Alto’s Unit 42 say a suspected group of Chinese actors infiltrated email servers used by foreign ministries. The attackers accessed Microsoft Exchange systems and combed through messages related to diplomatic activities.  The threat, dubbed “Phantom Taurus” targets governments and telecoms across Africa, the Middle East, and Asia. Its operations align closely with […]
    Kirsten Doyle
  • AI Agents Open a New Front in Cybersecurity: ForcedLeak in Salesforce Agentforce September 30, 2025
    Noma Labs has uncovered a severe flaw in Salesforce’s Agentforce platform. The chain of vulnerabilities, dubbed ForcedLeak, carried a CVSS score of 9.4 and exposed customer data to theft through indirect prompt injection and a loophole in Salesforce’s Content Security Policy.  The weakness lay in how Agentforce (an autonomous AI agent) processed instructions. Unlike conventional […]
    Kirsten Doyle
  • Harrods Will Not Engage with Its Attackers September 30, 2025
    Harrods says attackers made contact after a breach compromised data belonging to 430,000 customers. The luxury department store said it will not be engaging with them.    The information was taken from a third-party provider. In a statement, Harrods said: “We proactively informed affected e-commerce customers on Friday that the impacted personal data is limited to […]
    Kirsten Doyle
  • Federal Agencies Scramble as Cisco Firewall Flaws Are Exploited September 29, 2025
    Federal civilian agencies must immediately patch critical Cisco firewall vulnerabilities being exploited by an “advanced threat actor.”   The Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive ordering immediate action.  The vulnerabilities (CVE-2025-20333 and CVE-2025-20362) affect Cisco Adaptive Security Appliances (ASA). One allows remote code execution, the other privilege escalation.   Bad actors have been […]
    Kirsten Doyle

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc