Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Blog

VigilantAI > Blog

Blog

  • November 7, 2024
  • No Comments

A Hacker’s Guide to Password Cracking

  • November 7, 2024
  • No Comments

North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS

  • November 7, 2024
  • No Comments

China-Aligned MirrorFace Hackers Target EU Diplomats with World Expo 2025 Bait

  • November 7, 2024
  • No Comments

Malicious PyPI Package ‘Fabrice’ Found Stealing AWS Keys from Thousands of Developers

  • November 7, 2024
  • No Comments

SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims

  • November 7, 2024
  • No Comments

5 Most Common Malware Techniques in 2024

  • November 7, 2024
  • No Comments

Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems

  • November 7, 2024
  • No Comments

Canada Orders TikTok to Shut Down Canadian Operations Over Security Concerns

  • November 6, 2024
  • No Comments

VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware

  • November 6, 2024
  • No Comments

New Winos 4.0 Malware Infects Gamers Through Malicious Game Optimization Apps

  • Prev
  • 1
  • …
  • 223
  • 224
  • 225
  • 226
  • 227
  • …
  • 238
  • Next

Recent Posts

  • Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managers
  • Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens
  • Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware
  • Safe and Inclusive E‑Society: How Lithuania Is Bracing for AI‑Driven Cyber Fraud
  • New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft

Recent Comments

No comments to show.

Explore Categories

  • Blog 2,376

Recent Posts

img

Infostealer Steals OpenClaw AI Agent Configuration

February 16, 2026
img

Study Uncovers 25 Password Recovery Attacks

February 16, 2026
img

Weekly Recap: Outlook Add-Ins Hijack, 0-Day

February 16, 2026
img

Safe and Inclusive E‑Society: How Lithuania

February 16, 2026

RSS Cyber Security

  • Dutch Telecoms Company Odido Discloses Breach Affecting Approximately 6.2 Million Customers February 16, 2026
    Dutch telecoms business Odido has disclosed a cyberattack on its customer contact system that happened on 7 February.   The personal information of approximately 6.2 million customers was disclosed, including names, residential addresses, mobile phone numbers, email addresses, account numbers, and ID information such as passports and driver’s licenses.   In a statement, the company said no passwords, call details or billing information are involved.  “We deeply regret this incident […]
    Kirsten Doyle
  • Customer data from Volvo Group North America exposed in Conduent breach February 16, 2026
    Almost 17,000 Volvo employees have had their personal data exposed after attackers breached Conduent, an outsourcing company that manages workforce benefits and back-office services.   In a filing with the Maine Attorney General, Volvo Group North America said it learned in late January that employee data had been exposed through systems run by Conduent.   In a letter to customers, Conduent said: “On 13 January 2025, we discovered that we were the victim of […]
    Kirsten Doyle
  • The Silent Workforce: Non-Human Identities Are the Next Major Security Battleground February 16, 2026
    For years, cybersecurity strategies have focused on people. From employees and contractors to partners and insiders, that familiar ‘humans are the weakest link’ rhetoric has defined the industry for decades. The tools and strategies developed to defend against threats, like access management and identity governance, were largely designed with humans in mind. But as artificial […]
    Shane Barney
  • Closing the Cross-Platform Security Gap in Citizen Developer Apps February 13, 2026
    In many ways, managing security for citizen-developer apps is like flying several planes built by different manufacturers all at once. That’s because each no-code development platform uses separate dashboards, controls, policy engines, etc. Microsoft Power Platform measures altitude in feet, ServiceNow in meters, Salesforce reports it in knots, and UiPath wants to automate the landing […]
    Yair Finzi
  • The Top Pentesting Platforms of 2026: What You Need to Know February 11, 2026
    What to Look for in a Pentesting Platform? As the primary way of finding and exploiting vulnerabilities (before attackers do), pen testing platforms are a popular choice for businesses looking to launch sophisticated simulated attacks at scale. Here is a look at some of the top pen testing tools to watch in 2026, and what […]
    Joe Pettit
  • The Cyberattack That Exposed the Fragility of Digital Heritage February 11, 2026
    Saturday 28 October 2023 is a date that will live long in the memory of staff at the British Library. As they arrived for work that day, they encountered chaos taking place. Servers were no longer online. Crucial systems were encrypted. And digital catalogues had disappeared altogether. A cultural institution renowned all over the world, […]
    Kashif Nazir
  • Why Traditional Cyber Risk Management Is No Longer Enough in 2026 February 10, 2026
    As we settle into 2026, the cybersecurity industry is experiencing dramatic change. AI, AI agents, Quantum, and even traditional attack techniques are developing in ways that impact how we protect our organisations and even how we communicate with our customers. Preserving the status quo simply isn’t good enough, so evolving our defences to not only […]
    Peter Jones
  • Substack Discloses Major Data Breach February 9, 2026
    Media platform Substack has disclosed a data breach that exposed email addresses, phone numbers, and internal metadata of an unknown number of users. Credit card numbers, passwords, and financial information were not accessed.  In an email, Substack CEO Chris Best informed affected users that on 3 February, the company found evidence pointing to a third party having […]
    Kirsten Doyle
  • The Winter Olympics Are Back, and So Are Attackers February 6, 2026
    The Olympics have traditionally been a major attack vector for cyber disruption, espionage, and financially motivated attacks.   The 2018 Winter Olympic Games in PyeongChang saw the Olympic Destroyer malware used to disrupt Wi-Fi, ticket, and venue systems during the opening ceremony of the games. During the Paris 2024 event, there was an increase in scanning, […]
    Kirsten Doyle
  • Rethinking the Security Estate: Why IT Spend Isn’t the Same as Cybersecurity Readiness February 5, 2026
    Cybersecurity spend is projected to reach $183 billion by 2028, but that growth masks a dangerous misconception. Many midmarket organizations equate rising IT budgets with improved security, assuming that broad spending on technology automatically translates to better protection. However, this is creating a widening gap between what companies perceive and their actual security readiness. IT […]
    Michael Gray

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc