Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Author: gurushyam.mony

VigilantAI > Articles by: gurushyam.mony

Author: gurushyam.mony

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Russian RomCom Attacks Target Ukrainian Government with New SingleCamper RAT Variant

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Microsoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browser

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Beware: Fake Google Meet Pages Deliver Infostealers in Ongoing ClickFix Campaign

  • gurushyam.mony
  • October 21, 2024
  • No Comments

U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign

  • gurushyam.mony
  • October 21, 2024
  • No Comments

The Ultimate DSPM Guide: Webinar on Building a Strong Data Security Posture

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Acronym Overdose – Navigating the Complex Data Security Landscape

  • gurushyam.mony
  • October 21, 2024
  • No Comments

North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers

  • Prev
  • 1
  • …
  • 3
  • 4
  • 5

Recent Posts

  • Microsoft Removes Password Management from Authenticator App Starting August 2025
  • Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspects
  • U.S. Agencies Warn of Rising Iranian Cyberattacks on Defense, OT Networks, and Critical Infrastructure
  • Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks
  • ⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more

Recent Comments

No comments to show.

Explore Categories

  • Blog 1,257

Recent Posts

img

Microsoft Removes Password Management from Authenticator

July 01, 2025
img

U.S. Agencies Warn of Rising Iranian

June 30, 2025
img

Europol Dismantles $540 Million Cryptocurrency Fraud

June 30, 2025
img

Blind Eagle Uses Proton66 Hosting for

June 30, 2025

RSS Cyber Security

  • Staying Safe on Social Media in the Age of AI June 30, 2025
    Social media has become a daily part of life for billions worldwide. It connects us, informs us, and entertains us. Yet as artificial intelligence (AI) grows more advanced, the risks we face online have multiplied.   Deepfakes, AI-generated scams, and new attack methods exploit our trust and carelessness. The importance of knowing about these threats and […]
    Kirsten Doyle
  • Notorious Hacker “IntelBroker” Charged in $25 Million Global Cybercrime Spree June 30, 2025
    A British national accused of operating under the alias “IntelBroker” has been charged in the U.S. with a sweeping cybercrime campaign that caused more than $25 million in damages worldwide.  Kai West, 25, allegedly led a prolific hacking operation that targeted over 40 organizations, including a U.S. telecom provider, a municipal health agency, and an […]
    Kirsten Doyle
  • Cisco Patches Critical Flaws in ISE and ISE-PIC That Allow Root Access June 30, 2025
    Cisco has released urgent security fixes for two vulnerabilities affecting its Identity Services Engine (ISE) and Passive Identity Connector (ISE-PIC). Both flaws, CVE-2025-20281 and CVE-2025-20282, carry a CVSS severity rating of 10.0.   Through this exploit, an attacker could gain root access to systems that control identity and access management. Access would enable lateral movement, privilege […]
    Kirsten Doyle
  • Ahold Delhaize USA Confirms Data Breach Affected 2.2 Million People June 30, 2025
    Ahold Delhaize USA has confirmed that personal, financial, and health information belonging to over 2.2 million individuals was compromised during a cybersecurity breach in November last year.  Details of the breach were formally disclosed in a filing with the Maine Attorney General’s office on 26 June 2025. The incident, attributed to an external system intrusion, […]
    Kirsten Doyle
  • AI-Powered Cyberattacks Surge as IT Teams Struggle to Adapt June 30, 2025
    Cybercriminals are no longer just guessing passwords; they’re mimicking CEOs, cracking login credentials with machine learning, and flooding inboxes with synthetic spear-phishing emails. A new report from Frontegg reveals that artificial intelligence is not just shaping the cybersecurity landscape, it’s inventing entirely new forms of attack, and IT teams are struggling to keep pace.   New […]
    Josh Breaker Rolfe
  • Going SIEM-less in 2025: A Smarter Path for Resource-Constrained IT Teams June 27, 2025
    Threats keep evolving, but budgets aren’t keeping pace. In fact, 51% of respondents to ISACA’s State of Cybersecurity 2024 report say that their cyber budgets are underfunded. For organizations dealing with these constraints, traditional enterprise tools like SIEM (Security Information and Event Management) systems can be more of a burden than a benefit. This is […]
    Ted Gruenloh
  • New Malware Tries and Fails to Fool AI Detection Tools June 27, 2025
    Cybersecurity researchers at Check Point Software have identified what may be the first ever attempt by malware to manipulate AI-based security systems using prompt injection. While the tactic ultimately failed, the incident could be a sign of what’s to come: attackers targeting the artificial intelligence tools defenders now rely on.   The malware, uploaded anonymously from […]
    Josh Breaker Rolfe
  • Commercial Software’s Seven Deadly Sins June 26, 2025
    After two decades leading enterprise security across critical infrastructure and technology sectors, I’ve observed a dangerous pattern in how we discuss software supply chain attacks. The conversation focuses almost exclusively on risks hiding within open-source software packages. We’ve seen this firsthand through incidents where cybercriminals and nation-state actors leverage open-source code and platforms to their […]
    Saša Zdjelar
  • Recognizing and Avoiding Common Social Engineering Tactics June 25, 2025
    When you say the word “cyberattack,” most businesses automatically relate it to the aftermath of high-profile security breaches like ransomware or denial of service (DoS) attacks. Those immensely disruptive attacks can lead to organizations halting overnight and causing irreparable damage to their systems and reputation. If you think of the severity of these types of […]
    Nazy Fouladirad
  • Thousands of UK Government Devices Lost or Stolen, Raising Cybersecurity Fears June 24, 2025
    More than 2,000 government-issued laptops, phones and tablets were lost or stolen across Whitehall departments over the past year, as reported by The Guardian. The estimated replacement cost? £1.3 million. The broader cost to national security is a lot harder to calculate.  Departments including the Ministry of Defence (MoD), the Department for Work and Pensions, […]
    Kirsten Doyle

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc