Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Blog

VigilantAI > Blog

Blog

  • February 13, 2025
  • No Comments

Fast Deployments, Secure Code: Watch this Learn to Sync Dev and Sec Teams

  • February 13, 2025
  • No Comments

Palo Alto Networks Patches Authentication Bypass Exploit in PAN-OS Software

  • February 13, 2025
  • No Comments

AI and Security – A New Puzzle to Figure Out

  • February 13, 2025
  • No Comments

Hackers Exploited PAN-OS Flaw to Deploy Chinese Malware in Ransomware Attack

  • February 13, 2025
  • No Comments

FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux

  • February 12, 2025
  • No Comments

Microsoft Uncovers Sandworm Subgroup’s Global Cyber Attacks Spanning 15+ Countries

  • February 12, 2025
  • No Comments

Researchers Find New Exploit Bypassing Patched NVIDIA Container Toolkit Vulnerability

  • February 12, 2025
  • No Comments

How to Steer AI Adoption: A CISO Guide

  • February 12, 2025
  • No Comments

North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack

  • February 12, 2025
  • No Comments

Microsoft’s Patch Tuesday Fixes 63 Flaws, Including Two Under Active Exploitation

  • Prev
  • 1
  • …
  • 73
  • 74
  • 75
  • 76
  • 77
  • …
  • 134
  • Next

Recent Posts

  • Cisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root Code
  • Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms
  • UNC6148 Backdoors Fully-Patched SonicWall SMA 100 Series Devices with OVERSTEP Rootkit
  • AI Agents Act Like Employees With Root Access—Here’s How to Regain Control
  • Critical Golden dMSA Attack in Windows Server 2025 Enables Cross-Domain Attacks and Persistent Access

Recent Comments

No comments to show.

Explore Categories

  • Blog 1,333

Recent Posts

img

Cisco Warns of Critical ISE Flaw

July 17, 2025
img

Hackers Leverage Microsoft Teams to Spread

July 16, 2025
img

UNC6148 Backdoors Fully-Patched SonicWall SMA 100

July 16, 2025
img

Critical Golden dMSA Attack in Windows

July 16, 2025

RSS Cyber Security

  • AI Appreciation Day: What the Experts Have to Say July 16, 2025
    This year’s AI Appreciation Day shines a light on the rising power of artificial intelligence in every field. Cybersecurity experts come together to discuss what AI has achieved, and the hurdles it still faces.   Cybersecurity experts share their views with Information Security Buzz:   Traditional Access Controls Fall Short   Rom Carmel, Co-founder and CEO at Apono, […]
    Kirsten Doyle
  • Taming Repeat Clickers: Managing High-Risk Cyber Behaviors July 16, 2025
    Of all the battles against phishing and social engineering attacks, organizations have a silent and underestimated security threat: the repeat clicker. These individuals, despite years of awareness training and simulated phishing drills, consistently click on suspicious links in emails. Unlike one-time mistakes, repeated clicking indicates ingrained behavioral habits that blanket awareness programs cannot correct. To […]
    Erich Kron
  • SVG Smuggling: How Malicious Images Are Hijacking Browsers July 16, 2025
    Threat actors have a new trick: hiding malicious JavaScript inside what looks like an innocent image, according to the Ontinue research team. A string of phishing campaigns is using SVG (Scalable Vector Graphics) files to smuggle browser redirects past traditional security tools. The result? Stealthy attacks, minimal user interaction, and victims who never see it […]
    Kirsten Doyle
  • Railway Systems at Risk: Critical Vulnerability Could Allow Remote Control of Trains July 16, 2025
    The Cybersecurity and Infrastructure Security Agency (CISA) has issued a grave warning about a critical vulnerability affects railroad communication systems across the US.   The flaw, designated as CVE-2025-1727, can potentially enable bad actors to control train brakes remotely (radio-proximity, not global internet).  This vulnerability focuses on the End-of-Train and Head-of-Train protocols, collectively known as FRED.   […]
    Kirsten Doyle
  • CISOs Take Charge as OT Security Matures July 16, 2025
    Operational technology (OT) security has become a boardroom issue, according to recent Fortinet research. The report reveals that 52% of organizations now assign OT cybersecurity to the CISO or CSO, up from just 16% in 2022. That number is expected to climb to 80% within the next year.   This growing executive accountability reflects heightened concerns […]
    Josh Breaker Rolfe
  • NCA Nets Suspects in Cyber Attacks on M&S, Co-op and Harrods July 15, 2025
    Four young people have been arrested after cyber attacks on some of the UK’s best-known retailers.  The National Crime Agency picked up two 19-year-old men, a 17-year-old boy, and a 20-year-old woman. Early morning raids. Homes searched. Devices seized.  All remain in custody.  The arrests follow coordinated attacks on M&S, Co-op and Harrods in April. […]
    Kirsten Doyle
  • 84% of Enterprises at Risk from Weak API Security  July 15, 2025
    Enterprise platforms have a major API security gap, with 84% of organizations exposing sensitive data through APIs without adequate safeguards, new research from Raidiam has revealed.   The study, which profiled 68 companies in sectors like fintech, SaaS, and payments, highlights a growing disconnect between the sensitivity of data flowing through APIs and the strength of […]
    Josh Breaker Rolfe
  • The Dark Data Marketplaces Funding Cybercrime July 14, 2025
    Every breach headline hides a second-act drama that unfolds out of sight. Once hackers extract a trove of corporate records or consumer log-ins, that data rarely sits idle; it flows straight into a shadow economy that has grown as sophisticated as any legitimate e-commerce sector. Researchers now count about 30,000 active hidden-service sites on the […]
    Isla Sibanda
  • PerfektBlue: Bluetooth Flaws Expose Cars to One-Click Remote Code Execution July 14, 2025
    Four linked vulnerabilities in OpenSynergy’s Blue SDK allow attackers to take over a vehicle’s infotainment system with a single click. The flaws affect major automotive brands, including Mercedes-Benz, Volkswagen, and Skoda.  The PCA Security Assessment Team discovered the issues while analyzing compiled Blue SDK binaries. They didn’t have source code. They didn’t need it.  The […]
    Kirsten Doyle
  • New Attack Uses Gemini Summaries to Deliver Phishing Lures July 14, 2025
    A new vulnerability in Google Gemini for Workspace shows how AI can be turned into a silent accomplice.  A security researcher has uncovered a way to smuggle malicious commands into an email, hidden from the user’s view but faithfully executed by Gemini.   When the recipient clicks “Summarize this email,” Gemini parses the invisible instruction and […]
    Kirsten Doyle

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc