Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Category: Blog

VigilantAI > Blog > Blog

Category: Blog

Your blog category

  • gurushyam.mony
  • October 21, 2024
  • No Comments

New Linux Variant of FASTCash Malware Targets Payment Switches in ATM Heists

  • gurushyam.mony
  • October 21, 2024
  • No Comments

New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT

  • gurushyam.mony
  • October 21, 2024
  • No Comments

TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns

  • gurushyam.mony
  • October 21, 2024
  • No Comments

CISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability

  • gurushyam.mony
  • October 21, 2024
  • No Comments

GitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Access

  • gurushyam.mony
  • October 21, 2024
  • No Comments

Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack

  • gurushyam.mony
  • October 21, 2024
  • No Comments

5 Techniques for Collecting Cyber Threat Intelligence

  • gurushyam.mony
  • October 21, 2024
  • No Comments

North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware

  • gurushyam.mony
  • October 21, 2024
  • No Comments

From Misuse to Abuse: AI Risks and Attacks

  • gurushyam.mony
  • October 21, 2024
  • No Comments

FIDO Alliance Drafts New Protocol to Simplify Passkey Transfers Across Different Platforms

  • Prev
  • 1
  • …
  • 155
  • 156
  • 157
  • 158
  • 159
  • Next

Recent Posts

  • Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign
  • Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys
  • CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation
  • TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations
  • SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild

Recent Comments

No comments to show.

Explore Categories

  • Blog 1,586

Recent Posts

img

Noisy Bear Targets Kazakhstan Energy Sector

September 06, 2025
img

Malicious npm Packages Impersonate Flashbots, Steal

September 06, 2025
img

CISA Orders Immediate Patch of Critical

September 05, 2025
img

TAG-150 Develops CastleRAT in Python and

September 05, 2025

RSS Cyber Security

  • The Six Cyber Weak Points Causing Power Grid Stress (And How to Fix Them) September 5, 2025
    The Industrial Internet of Things (IIoT) is altering power grid stress by straining outdated systems and broadening the cyberattack surface. With much of the infrastructure aging, the grid is left increasingly vulnerable to both physical and digital threats. Threat actors like hackers and other risks like natural disasters, and modernization have left utilities incoherent. Some […]
    Emily Newton
  • Attackers Exploit Grok AI to Spread Malware via Promoted Ads September 5, 2025
    Bad actors are exploiting Grok AI to push malware through promoted ads on X, in a scheme researchers are calling “Grokking.”  The method, uncovered by Guardio Labs researcher Nati Tal, takes advantage of how Grok parses hidden fields in ads.   Malvertisers post videos with adult content baits, but avoid direct links in the main body […]
    Kirsten Doyle
  • Users Share Personal, Emotional, Confidential Info with ChatGPT September 5, 2025
    ChatGPT users are routinely sharing personally identifiable information (PII), sensitive emotional disclosures, and confidential material with the AI platform, analysis from SafetyDetectives has revealed.   The cybersecurity reviewer’s deep dive into 1000s of ChatGPT conversations, leaked in August 2025, confirms what many already suspected: many internet users aren’t fully aware of how the AI model handles […]
    Josh Breaker Rolfe
  • Copilots to Agents: The Acceleration of AI-Driven Decision Making September 4, 2025
    GenAI is advancing at an unprecedented pace. Where Copilots once offered support and recommendations, we now witness the emergence of agentic AI. These systems can autonomously make decisions, complete intricate tasks, and interact seamlessly across platforms with limited human supervision. This transformation represents a major milestone for enterprise technology, presenting both vast opportunities and new […]
    Janne Saarela
  • From PowerShell to Payload: Darktrace Discovers Novel Cryptojacking Attack September 4, 2025
    In July 2025, Darktrace researchers detected an attempted cryptojacking incident on a retail and e-commerce network.   A desktop device initiated an HTTP connection to a rare endpoint, 45.141.87[.]195 over port 8000.   Embedded in the request was a PowerShell script, infect.ps1.   The script’s behavior flagged an immediate anomaly: a new PowerShell user agent making an unusual […]
    Kirsten Doyle
  • European Court Upholds EU-U.S. Data Privacy Framework, Clearing Path for Transatlantic Data Flows September 4, 2025
    The European General Court has backed the EU-U.S. Data Privacy Framework (DPF).   The ruling clears legal uncertainty for organisations moving data across the Atlantic. It upholds the European Commission’s adequacy decision, and confirms that the framework protects personal data while still enabling cross-border digital activity.  ITI and its members welcomed the decision. It provides clarity […]
    Kirsten Doyle
  • Why It’s Time to Ditch the VPN and Embrace RPAM for Secure Remote Work September 3, 2025
    As much of the workforce takes advantage of late-summer holidays, employees, contractors, and third-party vendors continue to log in remotely from holiday homes, airports, or hotels, far from the traditional corporate environment. This surge in remote access inevitably heightens security risks. For IT and security teams already managing a sprawling attack surface, reduced visibility and […]
    James Edwards
  • WhatsApp Reveals Zero-Day Exploited in Targeted Apple Attacks September 3, 2025
    WhatsApp has disclosed a zero-day flaw that was used in precision attacks against Apple users.  The bug, tracked as CVE-2025-55177 with a CVSS score of 8.0, involved incomplete authorization of linked device sync messages. In practice, that meant an attacker could trick a device into processing content from arbitrary URLs.  The issue affected WhatsApp for […]
    Kirsten Doyle
  • Cyber Attack Severely Disrupts Jaguar Land Rover Production September 3, 2025
    Jaguar Land Rover (JLR) has fallen victim to a cyber-attack.  In a statement JLR said: “JLR has been impacted by a cyber incident. We took immediate action to mitigate its impact by proactively shutting down our systems. We are now working at pace to restart our global applications in a controlled manner.”  The company, owned […]
    Kirsten Doyle
  • European Commission President’s Plane GPS Signal Disrupted Amid Suspected Russian Jamming September 3, 2025
    The European Union said Monday that Russia was suspected of jamming the GPS system of a plane carrying European Commission President Ursula von der Leyen to Bulgaria on Sunday.  “We can indeed confirm that there was GPS jamming, but the plane landed safely in Bulgaria,” a European Commission spokesperson told reporters. “We have received information […]
    Kirsten Doyle

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc