Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Blog

VigilantAI > Blog

Blog

  • July 28, 2025
  • No Comments

Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure

  • July 28, 2025
  • No Comments

Critical Flaws in Niagara Framework Threaten Smart Buildings and Industrial Systems Worldwide

  • July 25, 2025
  • No Comments

Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files

  • July 25, 2025
  • No Comments

U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

  • July 25, 2025
  • No Comments

Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor

  • July 25, 2025
  • No Comments

Overcoming Risks from Chinese GenAI Tool Usage

  • July 25, 2025
  • No Comments

Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

  • July 24, 2025
  • No Comments

Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems

  • July 24, 2025
  • No Comments

Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

  • July 24, 2025
  • No Comments

CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing

  • Prev
  • 1
  • …
  • 13
  • 14
  • 15
  • 16
  • 17
  • …
  • 153
  • Next

Recent Posts

  • Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3
  • UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats
  • Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads
  • ⚡ Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More
  • Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations

Recent Comments

No comments to show.

Explore Categories

  • Blog 1,525

Recent Posts

img

Docker Fixes CVE-2025-9074, Critical Container Escape

August 25, 2025
img

UNC6384 Deploys PlugX via Captive Portal

August 25, 2025
img

Phishing Campaign Uses UpCrypter in Fake

August 25, 2025
img

⚡ Weekly Recap: Password Manager Flaws,

August 25, 2025

RSS Cyber Security

  • CrowdStrike Thwarts Malvertising Drive for SHAMOS on macOS August 25, 2025
    Between June and August this year, CrowdStrike’s Falcon platform stopped a coordinated malware campaign aimed at more than 300 customer environments. The operation involved SHAMOS, a variant of the Atomic macOS Stealer (AMOS), built and rented out by the cybercriminal group COOKIE SPIDER. The scheme was simple. Malvertising lured users searching for macOS fixes to […]
    Kirsten Doyle
  • Ransomware Surges as AI Drives New Cyber Threats August 25, 2025
    The number of publicly known ransomware victims jumped early 70% compared to the same period in 2023 and 2024, according to the newly released Acronis Cyberthreats Report H1 2025.   The surge underscores ransomware’s continuing grip on businesses worldwide, especially as attackers increasingly exploit AI to sharpen their tactics.   While the endgame for cybercriminals is still […]
    Josh Breaker Rolfe
  • Out of Office, Not Out of Mind: Staying Cyber-Smart Over the Holidays August 22, 2025
    We’re back with another expert interview! This time, we’re joined by Matt Warner, CEO and co-founder of Blumira, to talk about how businesses can stay ahead of cyber threats during the summer months and why this quieter season might be the best time to strengthen their security defenses. It’s the holiday season, and attacks often […]
    Dilki Rathnayake
  • Cybercrime Is Hiring: AI, IoT, and Cloud Experts Power the Next Wave of Attacks August 22, 2025
    The dark web has its own job boards. Its own recruiters. Its own economy of skills.  There, posts read like the listings on LinkedIn or Indeed, only the roles are not for project managers or analysts. They are for AI specialists, cloud exploiters, and social engineers fluent in English. The recruits are not employees. They […]
    Kirsten Doyle
  • From VPS to Phishing: Darktrace Exposes SaaS Hijacks through Virtual Infrastructure Abuse August 22, 2025
    Darktrace has uncovered a coordinated campaign of SaaS account takeovers. Attackers hid behind Virtual Private Servers, slipping into accounts, moving unseen, and wiping away the traces of phishing. The pattern was consistent: suspicious logins from VPS-linked infrastructure, swift creation of inbox rules, and deleted emails, particularly those tied to phishing. What researchers found was a […]
    Kirsten Doyle
  • Scamlexity: When AI Agents Become the Target, Not Just the Human August 22, 2025
    AI Browsers promise a future where an Agentic AI can handle your online life. From shopping to emails, they are designed to act autonomously, to save time, to make life easier. Yet convenience has a price. Recent researach by Guardio reveals a worrying truth: security guardrails are inconsistent, sometimes absent entirely. The AI clicks, pays, […]
    Kirsten Doyle
  • Manufacturers Scramble to Adopt AI as Cyber Threats Escalate August 22, 2025
    Cybersecurity has risen to the top of the manufacturing industry’s risk agenda. A new report from Rockwell Automation reveals that 61% of IT and security professionals plan to adopt AI and machine learning (ML) for cyber defense in the next year – 12 points ahead of general AI adoption across the sector.   Meanwhile, 30% of […]
    Josh Breaker Rolfe
  • Your Microsoft 365 Email Security Needs a Smarter Ally August 22, 2025
    On a Friday afternoon, a finance executive at a mid-sized firm receives a short email. No links. No attachments. Just a familiar name, a sense of urgency, and a request to move funds. It looked right, and it felt right. But it wasn’t. The transfer went through, and the money vanished without the bad actor […]
    Usman Choudhary
  • Russian Espionage Group Exploits Old Cisco Flaw to Target Critical Infrastructure August 21, 2025
    The FBI and Cisco Talos have issued fresh warnings about a Russian cyber espionage campaign that has quietly compromised network devices around the world. The threat actor, tracked as Static Tundra, is linked to the Federal Security Service’s (FSB) Center 16 unit and has been active for more than a decade. At the heart of […]
    Kirsten Doyle
  • Patching for Persistence: DripDropper Malware Secures the Door It Broke Open August 21, 2025
    It sounds counterintuitive. An adversary exploits a system, gains access, and then patches the very hole they used to break in. Yet that is exactly what Red Canary researchers observed in a recent campaign targeting cloud-based Linux servers. The logic is simple. By fixing the exploited vulnerability, a malefactor can lock out rivals and mask […]
    Kirsten Doyle

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc