Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Blog

VigilantAI > Blog

Blog

  • March 4, 2025
  • No Comments

Suspected Iranian Hackers Used Compromised Indian Firm’s Email to Target U.A.E. Aviation Sector

  • March 4, 2025
  • No Comments

Cisco, Hitachi, Microsoft, and Progress Flaws Actively Exploited—CISA Sounds Alarm

  • March 4, 2025
  • No Comments

Google’s March 2025 Android Security Update Fixes Two Actively Exploited Vulnerabilities

  • March 3, 2025
  • No Comments

Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail

  • March 3, 2025
  • No Comments

U.K. ICO Investigates TikTok, Reddit, and Imgur Over Children’s Data Protection Practices

  • March 3, 2025
  • No Comments

Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks

  • March 3, 2025
  • No Comments

Hackers Use ClickFix Trick to Deploy PowerShell-Based Havoc C2 via SharePoint Sites

  • March 3, 2025
  • No Comments

⚡ THN Weekly Recap: Alerts on Zero-Day Exploits, AI Breaches, and Crypto Heists

  • March 3, 2025
  • No Comments

The New Ransomware Groups Shaking Up 2025

  • March 3, 2025
  • No Comments

Vo1d Botnet’s Peak Surpasses 1.59M Infected Android TVs, Spanning 226 Countries

  • Prev
  • 1
  • …
  • 93
  • 94
  • 95
  • 96
  • 97
  • …
  • 162
  • Next

Recent Posts

  • Apple Warns French Users of Fourth Spyware Campaign in 2025, CERT-FR Confirms
  • Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks
  • Critical CVE-2025-5086 in DELMIA Apriso Actively Exploited, CISA Issues Warning
  • New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit
  • Cloud-Native Security in 2025: Why Runtime Visibility Must Take Center Stage

Recent Comments

No comments to show.

Explore Categories

  • Blog 1,619

Recent Posts

img

Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited

September 12, 2025
img

Apple Warns French Users of Fourth

September 12, 2025
img

New HybridPetya Ransomware Bypasses UEFI Secure

September 12, 2025
img

Critical CVE-2025-5086 in DELMIA Apriso Actively

September 12, 2025

RSS Cyber Security

  • Why Traditional Security Operations Are Financially Unsustainable September 12, 2025
    Most SOC budgets don’t reflect the true cost of running security operations. Budgets often include salaries, software, and infrastructure, but ignore the steady, compounding costs that drain time, money, and talent daily. Clearly, security teams are under fire. Tight budgets, a climbing volume of alerts, high analyst turnover, and more sophisticated threats put security teams […]
    Tom Findling
  • Global Cyber Threats Stay High as Attacks Climb Year-on-Year September 12, 2025
    Organisations faced an average of 1,994 cyberattacks per week in August.  This was revealed by Check Point’s Global Threat Intelligence Report for August 2025. That’s slightly down from July, just 1%, but still 10% higher than a year ago.   The picture is clear: cyber threats remain persistent and intense.  Industries Under Pressure  Education remained the […]
    Kirsten Doyle
  • Why More Factors Often Mean Less Security in Modern Authentication September 11, 2025
    Authentication has always been the front door to digital systems, but most organizations still treat it like a commodity function. More like a lock from the local hardware store than a high-security system protecting sensitive enterprise assets. That’s why we often hear talk about “multi-factor authentication” (MFA) as though the phrase itself conveys strength. If […]
    Mike Engle
  • AI Becomes the New Backbone of Security Operations, But Challenges Remain September 10, 2025
    Security Operations Centers (SOCs) are drowning in noise. The average company now generates close to a thousand alerts a day. For very large enterprises, the number surges past 3,000. Close to half (40% never get fully investigated. Some turn out to be critical.  This is outlined in Prophet Security’s new report, “State of AI in […]
    Kirsten Doyle
  • When Innovation Meets Education: Caution Before Celebrating ‘OpenAI for Greece’ September 10, 2025
    Generative AI (GenAI) has clear potential in low-risk contexts—such as enhancing productivity, supporting research, and aiding professional workflows. Where it can serve as a powerful, time-saving tool. But this begins to change dramatically when we enter high-risk arenas, particularly education, where minors are involved and formative learning, trust, and their rights need safeguarding. Any steps […]
    Anastasios Arampatzis
  • How to Protect Your VoIP System from DDoS Attacks September 9, 2025
    Imagine you walk into your office on a Monday morning. Phones are ringing nonstop, your sales team is preparing for a major client call, and support lines are stacked. There are no outgoing calls, and customers cannot reach you anymore. Then you think it’s a glitch, but it’s a VoIP DDoS attack, a cyberattack that […]
    Nnamani Chinwoke
  • MostereRAT Deploys AnyDesk and TightVNC for Full System Control September 9, 2025
    Bad actors are stepping up. FortiGuard Labs has uncovered a phishing campaign that installs MostereRAT, a remote access trojan built to evade defenses and seize full control of a machine.  The path is familiar. A phishing email lands in the inbox of a Japanese user. It looks like a business inquiry, routine and harmless. A […]
    Kirsten Doyle
  • Patch Now: Critical SAP S/4HANA Code Injection Flaw Exploited in the Wild September 8, 2025
    A newly disclosed vulnerability in SAP S/4HANA has been rated critical, with security researchers warning that exploitation is already underway.  The flaw, tracked as CVE-2025-42957, carries a CVSS score of 9.9 and affects S/4HANA systems running S4CORE versions 102 through 108, both in private cloud and on-premise deployments.   According to the official CVE record published […]
    Kirsten Doyle
  • Qantas Slashes Executive Bonuses After Cyber Breach September 8, 2025
    Qantas has cut short-term bonuses for its top executives by 15% in response to a customer data breach, even as the airline reported a strong year of profits.  CEO Vanessa Hudson saw her bonus reduced by about AUD 250,000 under the 2025 remuneration decisions, with the airline saying the adjustment reflected shared accountability across the […]
    Kirsten Doyle
  • The Six Cyber Weak Points Causing Power Grid Stress (And How to Fix Them) September 5, 2025
    The Industrial Internet of Things (IIoT) is altering power grid stress by straining outdated systems and broadening the cyberattack surface. With much of the infrastructure aging, the grid is left increasingly vulnerable to both physical and digital threats. Threat actors like hackers and other risks like natural disasters, and modernization have left utilities incoherent. Some […]
    Emily Newton

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc