Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Blog

VigilantAI > Blog

Blog

  • gurushyam.mony
  • October 21, 2024
  • No Comments

From Misuse to Abuse: AI Risks and Attacks

  • gurushyam.mony
  • October 21, 2024
  • No Comments

FIDO Alliance Drafts New Protocol to Simplify Passkey Transfers Across Different Platforms

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk

  • gurushyam.mony
  • October 21, 2024
  • No Comments

U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks

  • gurushyam.mony
  • October 21, 2024
  • No Comments

SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack

  • gurushyam.mony
  • October 21, 2024
  • No Comments

5 Ways to Reduce SaaS Security Risks

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Russian RomCom Attacks Target Ukrainian Government with New SingleCamper RAT Variant

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Researchers Uncover Cicada3301 Ransomware Operations and Its Affiliate Program

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Microsoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browser

  • Prev
  • 1
  • …
  • 131
  • 132
  • 133
  • 134
  • Next

Recent Posts

  • Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
  • Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency Miner
  • CTEM vs ASM vs Vulnerability Management: What Security Leaders Need to Know in 2025
  • Europol Disrupts NoName057(16) Hacktivist Group Linked to DDoS Attacks Against Ukraine
  • Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom Backdoors

Recent Comments

No comments to show.

Explore Categories

  • Blog 1,338

Recent Posts

img

Hackers Use GitHub Repositories to Host

July 17, 2025
img

Hackers Exploit Apache HTTP Server Flaw

July 17, 2025
img

CTEM vs ASM vs Vulnerability Management:

July 17, 2025
img

Europol Disrupts NoName057(16) Hacktivist Group Linked

July 17, 2025

RSS Cyber Security

  • How CTEM Helps Security Teams Focus on What Matters Most July 17, 2025
    Cybersecurity exposure isn’t just about known vulnerabilities. It’s about the misconfigurations, control gaps and overlooked entry points that attackers use to move quietly through systems and compromise high-value assets. Traditional security approaches often focus on patching known issues and generating long lists of CVEs. But they don’t always reflect what attackers see or how they […]
    Süleyman Özarslan
  • Episource Breach Exposes Health Data of 5.4 Million Americans July 17, 2025
    A medical billing company tied to UnitedHealth has suffered one of the year’s largest healthcare breaches.  More than 5.4 million people have been caught in the fallout.  Episource, which handles claims and billing for doctors and hospitals, said a criminal gained access to its systems earlier this year. The breach lasted a week, ending on […]
    Kirsten Doyle
  • Chinese Hackers Breached U.S. National Guard Network for Nine Months July 17, 2025
    A Chinese state-backed hacking group infiltrated a U.S. Army National Guard network and stayed there, undetected, for most of 2024. The group, known as Salt Typhoon, is believed to have operated inside the network of an unnamed U.S. state from March through December, according to a Department of Homeland Security memo. Their reach may have […]
    Kirsten Doyle
  • AI Appreciation Day: What the Experts Have to Say July 16, 2025
    This year’s AI Appreciation Day shines a light on the rising power of artificial intelligence in every field. Cybersecurity experts come together to discuss what AI has achieved, and the hurdles it still faces.   Cybersecurity experts share their views with Information Security Buzz:   Traditional Access Controls Fall Short   Rom Carmel, Co-founder and CEO at Apono, […]
    Kirsten Doyle
  • Taming Repeat Clickers: Managing High-Risk Cyber Behaviors July 16, 2025
    Of all the battles against phishing and social engineering attacks, organizations have a silent and underestimated security threat: the repeat clicker. These individuals, despite years of awareness training and simulated phishing drills, consistently click on suspicious links in emails. Unlike one-time mistakes, repeated clicking indicates ingrained behavioral habits that blanket awareness programs cannot correct. To […]
    Erich Kron
  • SVG Smuggling: How Malicious Images Are Hijacking Browsers July 16, 2025
    Threat actors have a new trick: hiding malicious JavaScript inside what looks like an innocent image, according to the Ontinue research team. A string of phishing campaigns is using SVG (Scalable Vector Graphics) files to smuggle browser redirects past traditional security tools. The result? Stealthy attacks, minimal user interaction, and victims who never see it […]
    Kirsten Doyle
  • Railway Systems at Risk: Critical Vulnerability Could Allow Remote Control of Trains July 16, 2025
    The Cybersecurity and Infrastructure Security Agency (CISA) has issued a grave warning about a critical vulnerability affects railroad communication systems across the US.   The flaw, designated as CVE-2025-1727, can potentially enable bad actors to control train brakes remotely (radio-proximity, not global internet).  This vulnerability focuses on the End-of-Train and Head-of-Train protocols, collectively known as FRED.   […]
    Kirsten Doyle
  • CISOs Take Charge as OT Security Matures July 16, 2025
    Operational technology (OT) security has become a boardroom issue, according to recent Fortinet research. The report reveals that 52% of organizations now assign OT cybersecurity to the CISO or CSO, up from just 16% in 2022. That number is expected to climb to 80% within the next year.   This growing executive accountability reflects heightened concerns […]
    Josh Breaker Rolfe
  • NCA Nets Suspects in Cyber Attacks on M&S, Co-op and Harrods July 15, 2025
    Four young people have been arrested after cyber attacks on some of the UK’s best-known retailers.  The National Crime Agency picked up two 19-year-old men, a 17-year-old boy, and a 20-year-old woman. Early morning raids. Homes searched. Devices seized.  All remain in custody.  The arrests follow coordinated attacks on M&S, Co-op and Harrods in April. […]
    Kirsten Doyle
  • 84% of Enterprises at Risk from Weak API Security  July 15, 2025
    Enterprise platforms have a major API security gap, with 84% of organizations exposing sensitive data through APIs without adequate safeguards, new research from Raidiam has revealed.   The study, which profiled 68 companies in sectors like fintech, SaaS, and payments, highlights a growing disconnect between the sensitivity of data flowing through APIs and the strength of […]
    Josh Breaker Rolfe

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc