Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Blog

VigilantAI > Blog

Blog

  • March 28, 2025
  • No Comments

PJobRAT Malware Campaign Targeted Taiwanese Users via Fake Chat Apps

  • March 28, 2025
  • No Comments

Mozilla Patches Critical Firefox Bug Similar to Chrome’s Recent Zero-Day Vulnerability

  • March 28, 2025
  • No Comments

Nine-Year-Old npm Packages Hijacked to Exfiltrate API Keys via Obfuscated Scripts

  • March 27, 2025
  • No Comments

New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victims’ DNS Email Records

  • March 27, 2025
  • No Comments

Hackers Repurpose RansomHub’s EDRKillShifter in Medusa, BianLian, and Play Attacks

  • March 27, 2025
  • No Comments

New Report Explains Why CASB Solutions Fail to Address Shadow SaaS and How to Fix It

  • March 27, 2025
  • No Comments

APT36 Spoofs India Post Website to Infect Windows and Android Users with Malware

  • March 27, 2025
  • No Comments

Top 3 MS Office Exploits Hackers Use in 2025 – Stay Alert!

  • March 27, 2025
  • No Comments

150,000 Sites Compromised by JavaScript Injection Promoting Chinese Gambling Platforms

  • March 27, 2025
  • No Comments

NetApp SnapCenter Flaw Could Let Users Gain Remote Admin Access on Plug-In Systems

  • Prev
  • 1
  • …
  • 80
  • 81
  • 82
  • 83
  • 84
  • …
  • 162
  • Next

Recent Posts

  • Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence
  • Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity
  • SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers
  • Cracking the Boardroom Code: Helping CISOs Speak the Language of Business
  • Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts

Recent Comments

No comments to show.

Explore Categories

  • Blog 1,613

Recent Posts

img

Senator Wyden Urges FTC to Probe

September 11, 2025
img

Google Pixel 10 Adds C2PA Support

September 11, 2025
img

SonicWall SSL VPN Flaw and Misconfigurations

September 11, 2025
img

Fake Madgicx Plus and SocialMetrics Extensions

September 11, 2025

RSS Cyber Security

  • Why More Factors Often Mean Less Security in Modern Authentication September 11, 2025
    Authentication has always been the front door to digital systems, but most organizations still treat it like a commodity function. More like a lock from the local hardware store than a high-security system protecting sensitive enterprise assets. That’s why we often hear talk about “multi-factor authentication” (MFA) as though the phrase itself conveys strength. If […]
    Mike Engle
  • AI Becomes the New Backbone of Security Operations, But Challenges Remain September 10, 2025
    Security Operations Centers (SOCs) are drowning in noise. The average company now generates close to a thousand alerts a day. For very large enterprises, the number surges past 3,000. Close to half (40% never get fully investigated. Some turn out to be critical.  This is outlined in Prophet Security’s new report, “State of AI in […]
    Kirsten Doyle
  • When Innovation Meets Education: Caution Before Celebrating ‘OpenAI for Greece’ September 10, 2025
    Generative AI (GenAI) has clear potential in low-risk contexts—such as enhancing productivity, supporting research, and aiding professional workflows. Where it can serve as a powerful, time-saving tool. But this begins to change dramatically when we enter high-risk arenas, particularly education, where minors are involved and formative learning, trust, and their rights need safeguarding. Any steps […]
    Anastasios Arampatzis
  • How to Protect Your VoIP System from DDoS Attacks September 9, 2025
    Imagine you walk into your office on a Monday morning. Phones are ringing nonstop, your sales team is preparing for a major client call, and support lines are stacked. There are no outgoing calls, and customers cannot reach you anymore. Then you think it’s a glitch, but it’s a VoIP DDoS attack, a cyberattack that […]
    Nnamani Chinwoke
  • MostereRAT Deploys AnyDesk and TightVNC for Full System Control September 9, 2025
    Bad actors are stepping up. FortiGuard Labs has uncovered a phishing campaign that installs MostereRAT, a remote access trojan built to evade defenses and seize full control of a machine.  The path is familiar. A phishing email lands in the inbox of a Japanese user. It looks like a business inquiry, routine and harmless. A […]
    Kirsten Doyle
  • Patch Now: Critical SAP S/4HANA Code Injection Flaw Exploited in the Wild September 8, 2025
    A newly disclosed vulnerability in SAP S/4HANA has been rated critical, with security researchers warning that exploitation is already underway.  The flaw, tracked as CVE-2025-42957, carries a CVSS score of 9.9 and affects S/4HANA systems running S4CORE versions 102 through 108, both in private cloud and on-premise deployments.   According to the official CVE record published […]
    Kirsten Doyle
  • Qantas Slashes Executive Bonuses After Cyber Breach September 8, 2025
    Qantas has cut short-term bonuses for its top executives by 15% in response to a customer data breach, even as the airline reported a strong year of profits.  CEO Vanessa Hudson saw her bonus reduced by about AUD 250,000 under the 2025 remuneration decisions, with the airline saying the adjustment reflected shared accountability across the […]
    Kirsten Doyle
  • The Six Cyber Weak Points Causing Power Grid Stress (And How to Fix Them) September 5, 2025
    The Industrial Internet of Things (IIoT) is altering power grid stress by straining outdated systems and broadening the cyberattack surface. With much of the infrastructure aging, the grid is left increasingly vulnerable to both physical and digital threats. Threat actors like hackers and other risks like natural disasters, and modernization have left utilities incoherent. Some […]
    Emily Newton
  • Attackers Exploit Grok AI to Spread Malware via Promoted Ads September 5, 2025
    Bad actors are exploiting Grok AI to push malware through promoted ads on X, in a scheme researchers are calling “Grokking.”  The method, uncovered by Guardio Labs researcher Nati Tal, takes advantage of how Grok parses hidden fields in ads.   Malvertisers post videos with adult content baits, but avoid direct links in the main body […]
    Kirsten Doyle
  • Users Share Personal, Emotional, Confidential Info with ChatGPT September 5, 2025
    ChatGPT users are routinely sharing personally identifiable information (PII), sensitive emotional disclosures, and confidential material with the AI platform, analysis from SafetyDetectives has revealed.   The cybersecurity reviewer’s deep dive into 1000s of ChatGPT conversations, leaked in August 2025, confirms what many already suspected: many internet users aren’t fully aware of how the AI model handles […]
    Josh Breaker Rolfe

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc