Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Blog

VigilantAI > Blog

Blog

  • gurushyam.mony
  • October 21, 2024
  • No Comments

The Rise of Zero-Day Vulnerabilities: Why Traditional Security Solutions Fall Short

  • gurushyam.mony
  • October 21, 2024
  • No Comments

New Linux Variant of FASTCash Malware Targets Payment Switches in ATM Heists

  • gurushyam.mony
  • October 21, 2024
  • No Comments

New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT

  • gurushyam.mony
  • October 21, 2024
  • No Comments

TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns

  • gurushyam.mony
  • October 21, 2024
  • No Comments

CISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability

  • gurushyam.mony
  • October 21, 2024
  • No Comments

GitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Access

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack

  • gurushyam.mony
  • October 21, 2024
  • No Comments

5 Techniques for Collecting Cyber Threat Intelligence

  • gurushyam.mony
  • October 21, 2024
  • No Comments

North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware

  • gurushyam.mony
  • October 21, 2024
  • No Comments

From Misuse to Abuse: AI Risks and Attacks

  • Prev
  • 1
  • …
  • 124
  • 125
  • 126
  • 127
  • 128
  • Next

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams

Recent Comments

No comments to show.

Explore Categories

  • Blog 1,277

Recent Posts

img

NightEagle APT Exploits Microsoft Exchange Flaw

July 04, 2025
img

Your AI Agents Might Be Leaking

July 04, 2025
img

Critical Sudo Vulnerabilities Let Local Users

July 04, 2025
img

Google Ordered to Pay $314M for

July 04, 2025

RSS Cyber Security

  • From Manual to Mindful: Elevating IT Support in the Age of Intelligent Automation July 4, 2025
    Across industries, IT support is undergoing a quiet revolution. While it once meant a reactive help desk resolving tickets on a first-come, first-served basis, today’s model is more proactive, data-driven, and increasingly powered by AI. At the centre of this shift are small and mid-sized enterprises (SMEs), which face a unique set of challenges: tighter […]
    Robert Phan
  • Critical Cisco Flaw Lets Attackers Gain Root Access to Unified CM July 4, 2025
    Cisco has patched a critical flaw in its Unified Communications Manager (Unified CM) software that allowed unauthenticated remote attackers to log in using hardcoded root credentials. The vulnerability, tracked as CVE-2025-20309, carries a CVSS score of 10.0 (the highest possible) and affects select engineering special (ES) builds of version 15.0.  The issue stems from development […]
    Kirsten Doyle
  • Ransomware Group Hunters International Claims Shutdown, Offers Free Decryptors July 4, 2025
    Hunters International, a notorious ransomware gang with ties to past high-profile cyberattacks, says it’s closing shop. The group made the announcement Thursday via its darknet extortion site, claiming it would release free decryption tools to help past victims recover data.  “After careful consideration and in light of recent developments, we have decided to close the […]
    Kirsten Doyle
  • Iranian Cyber Threats Surge Amid Geopolitical Tension July 4, 2025
    Cyberattacks linked to Iranian threat groups are on the rise, according to a new threat intelligence report from security provider Blumira. The report highlights how escalating geopolitical tensions between the US and Iran are driving a surge in Iranian state-linked cybers activity, particularly targeting critical sectors like healthcare, energy, and government.   Blumira, which monitors threats […]
    Josh Breaker Rolfe
  • Cyber Criminals Target Prime Day Shoppers with Fake Amazon Domains and Phishing Scams July 4, 2025
    Amazon Prime Day 2025 is almost here. So are the scammers.  With global shoppers gearing up for deals on 8 July, bad actors are already laying traps. In June alone, researchers tracked more than 1,000 new domains mimicking Amazon. Nearly nine in ten were flagged as malicious or suspicious. Many used the phrase “Amazon Prime” […]
    Kirsten Doyle
  • The Role of Penetration Testing in ATM Cybersecurity July 3, 2025
    Although many financial institutions offer digital services, ATMs remain critical points of interaction between banks and customers and an attractive target for cybercriminals. ATM attack methods are becoming more sophisticated, from card skimming to malware injection and man-in-the-middle attacks. Ensuring strong ATM cybersecurity is essential to safeguarding customer data, protecting financial assets, and maintaining consumer […]
    Zac Amos
  • Security Holes Plague EU Border Database, Report Finds July 3, 2025
    The Schengen Information System II (SIS II) is meant to be a digital sentinel for Europe’s borders. It flags suspects, alerts officials, and logs biometric data in real time. But behind the promise lies a system riddled with security flaws.  Bloomberg reviewed confidential documents showing thousands of unpatched vulnerabilities. Some date back years. In a […]
    Kirsten Doyle
  • Qantas Confirms Cyber Incident Affecting Up To 6 Million Customer Records July 3, 2025
    Qantas has confirmed a cyber incident affecting a third-party platform used by one of its call centres. The breach exposed the personal data of frequent flyer members and other customers. It has now been contained.  In a statement, the airline said it had launched an investigation after noticing strange activity on its customer service system, […]
    Kirsten Doyle
  • PDFs: The New Frontier of Phishing July 3, 2025
    Brand impersonation is nothing new. But Cisco Talos says it’s showing up in increasingly creative forms—especially within PDF attachments.  A recent update to Cisco’s intelligence brand impersonation detection engine now expands its reach. It picks up a broader array of email threats where trusted brand names arrive not in plain text, but tucked inside PDF […]
    Kirsten Doyle
  • Scattered Spider Takes Aim at Airlines and Transport Sector July 2, 2025
    The notorious cybercrime group, known as Scattered Spider, is shifting its focus. According to warnings issued in late June, the group has begun targeting North American airline and transportation companies.   The alerts come from both federal authorities and private sector threat intelligence teams.  The FBI confirmed this in a public advisory. The group’s method is […]
    Kirsten Doyle

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc