Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Blog

VigilantAI > Blog

Blog

  • May 19, 2025
  • No Comments

Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards

  • May 19, 2025
  • No Comments

⚡ Weekly Recap: Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More

  • May 19, 2025
  • No Comments

Why CTEM is the Winning Bet for CISOs in 2025

  • May 16, 2025
  • No Comments

New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors

  • May 16, 2025
  • No Comments

Top 10 Best Practices for Effective Data Protection

  • May 16, 2025
  • No Comments

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks

  • May 16, 2025
  • No Comments

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks

  • May 16, 2025
  • No Comments

[Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications

  • May 15, 2025
  • No Comments

Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit

  • May 15, 2025
  • No Comments

Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails

  • Prev
  • 1
  • …
  • 131
  • 132
  • 133
  • 134
  • 135
  • …
  • 237
  • Next

Recent Posts

  • Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations
  • Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs
  • UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors
  • Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
  • npm’s Update to Harden Their Supply Chain, and Points to Consider

Recent Comments

No comments to show.

Explore Categories

  • Blog 2,369

Recent Posts

img

Google Links China, Iran, Russia, North

February 13, 2026
img

Google Ties Suspected Russian Actor to

February 13, 2026
img

UAT-9921 Deploys VoidLink Malware to Target

February 13, 2026
img

Malicious Chrome Extensions Caught Stealing Business

February 13, 2026

RSS Cyber Security

  • Closing the Cross-Platform Security Gap in Citizen Developer Apps February 13, 2026
    In many ways, managing security for citizen-developer apps is like flying several planes built by different manufacturers all at once. That’s because each no-code development platform uses separate dashboards, controls, policy engines, etc. Microsoft Power Platform measures altitude in feet, ServiceNow in meters, Salesforce reports it in knots, and UiPath wants to automate the landing […]
    Yair Finzi
  • The Top Pentesting Platforms of 2026: What You Need to Know February 11, 2026
    What to Look for in a Pentesting Platform? As the primary way of finding and exploiting vulnerabilities (before attackers do), pen testing platforms are a popular choice for businesses looking to launch sophisticated simulated attacks at scale. Here is a look at some of the top pen testing tools to watch in 2026, and what […]
    Joe Pettit
  • The Cyberattack That Exposed the Fragility of Digital Heritage February 11, 2026
    Saturday 28 October 2023 is a date that will live long in the memory of staff at the British Library. As they arrived for work that day, they encountered chaos taking place. Servers were no longer online. Crucial systems were encrypted. And digital catalogues had disappeared altogether. A cultural institution renowned all over the world, […]
    Kashif Nazir
  • Why Traditional Cyber Risk Management Is No Longer Enough in 2026 February 10, 2026
    As we settle into 2026, the cybersecurity industry is experiencing dramatic change. AI, AI agents, Quantum, and even traditional attack techniques are developing in ways that impact how we protect our organisations and even how we communicate with our customers. Preserving the status quo simply isn’t good enough, so evolving our defences to not only […]
    Peter Jones
  • Substack Discloses Major Data Breach February 9, 2026
    Media platform Substack has disclosed a data breach that exposed email addresses, phone numbers, and internal metadata of an unknown number of users. Credit card numbers, passwords, and financial information were not accessed.  In an email, Substack CEO Chris Best informed affected users that on 3 February, the company found evidence pointing to a third party having […]
    Kirsten Doyle
  • The Winter Olympics Are Back, and So Are Attackers February 6, 2026
    The Olympics have traditionally been a major attack vector for cyber disruption, espionage, and financially motivated attacks.   The 2018 Winter Olympic Games in PyeongChang saw the Olympic Destroyer malware used to disrupt Wi-Fi, ticket, and venue systems during the opening ceremony of the games. During the Paris 2024 event, there was an increase in scanning, […]
    Kirsten Doyle
  • Rethinking the Security Estate: Why IT Spend Isn’t the Same as Cybersecurity Readiness February 5, 2026
    Cybersecurity spend is projected to reach $183 billion by 2028, but that growth masks a dangerous misconception. Many midmarket organizations equate rising IT budgets with improved security, assuming that broad spending on technology automatically translates to better protection. However, this is creating a widening gap between what companies perceive and their actual security readiness. IT […]
    Michael Gray
  • Microsoft: Python-Powered Infostealers Are Now Targeting macOS at Scale February 5, 2026
    Microsoft has warned that information-stealing attacks are rapidly expanding beyond Windows to target Apple macOS environments using cross-platform languages such as Python.  The software giant’s Defender Security Research Team has observed macOS-targeted infostealer campaigns using social engineering techniques like ClickFix since late 2025 to distribute disk image (DMG) installers that deploy stealer malware families like Atomic macOS Stealer (AMOS), MacSync, and DigitStealer.   The […]
    Kirsten Doyle
  • Forescout’s 2025 Threat Roundup: 84% OT Surge Signals Expanding Cyber Chaos February 5, 2026
    In 2025, attackers didn’t only target traditional areas of vulnerability; they went after those with the least defense and the most rapid change. These include new AI technologies, web applications, and operational technology (OT) for industries such as healthcare, manufacturing, energy, government, and finance.   In fact, attacks against OT protocol rose by a whopping 84% with Modbus, Ethernet/IP, and BACnet at the forefront. IoT exploits increased to 19%, hitting cameras and […]
    Kirsten Doyle
  • Notepad++ Update Hijacked in Six-Month, State-Linked Supply-Chain Attack February 3, 2026
    Attackers have hijacked the update mechanism of Notepad++, one of the world’s most popular open-source text editors, delivering  malware to targeted users over a period of six months.  In an advisory, developer Don Ho discussed how bad actors weaponized his two-decade-old project between June and December last year.  An update, said: “Multiple independent security researchers have assessed that the threat actor is likely a Chinese state-sponsored group, which would explain […]
    Kirsten Doyle

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc