Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Category: Blog

VigilantAI > Blog > Blog

Category: Blog

Your blog category

  • December 24, 2024
  • No Comments

Apache Tomcat Vulnerability CVE-2024-56337 Exposes Servers to RCE Attacks

  • December 23, 2024
  • No Comments

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips

  • December 23, 2024
  • No Comments

AI Could Generate 10,000 Malware Variants, Evading Detection in 88% of Case

  • December 23, 2024
  • No Comments

Rockstar2FA Collapse Fuels Expansion of FlowerStorm Phishing-as-a-Service

  • December 23, 2024
  • No Comments

Top 10 Cybersecurity Trends to Expect in 2025

  • December 23, 2024
  • No Comments

U.S. Judge Rules Against NSO Group in WhatsApp Pegasus Spyware Case

  • December 23, 2024
  • No Comments

Italy Fines OpenAI €15 Million for ChatGPT GDPR Data Privacy Violations

  • December 21, 2024
  • No Comments

LockBit Developer Rostislav Panev Charged for Billions in Global Ransomware Damages

  • December 20, 2024
  • No Comments

Lazarus Group Spotted Targeting Nuclear Engineers with CookiePlus Malware

  • December 20, 2024
  • No Comments

Sophos Issues Hotfixes for Critical Firewall Flaws: Update to Prevent Exploitation

  • Prev
  • 1
  • …
  • 200
  • 201
  • 202
  • 203
  • 204
  • …
  • 237
  • Next

Recent Posts

  • Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging
  • Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations
  • Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs
  • UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors
  • Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

Recent Comments

No comments to show.

Explore Categories

  • Blog 2,370

Recent Posts

img

Microsoft Discloses DNS-Based ClickFix Attack Using

February 15, 2026
img

Google Links China, Iran, Russia, North

February 13, 2026
img

Google Ties Suspected Russian Actor to

February 13, 2026
img

UAT-9921 Deploys VoidLink Malware to Target

February 13, 2026

RSS Cyber Security

  • Closing the Cross-Platform Security Gap in Citizen Developer Apps February 13, 2026
    In many ways, managing security for citizen-developer apps is like flying several planes built by different manufacturers all at once. That’s because each no-code development platform uses separate dashboards, controls, policy engines, etc. Microsoft Power Platform measures altitude in feet, ServiceNow in meters, Salesforce reports it in knots, and UiPath wants to automate the landing […]
    Yair Finzi
  • The Top Pentesting Platforms of 2026: What You Need to Know February 11, 2026
    What to Look for in a Pentesting Platform? As the primary way of finding and exploiting vulnerabilities (before attackers do), pen testing platforms are a popular choice for businesses looking to launch sophisticated simulated attacks at scale. Here is a look at some of the top pen testing tools to watch in 2026, and what […]
    Joe Pettit
  • The Cyberattack That Exposed the Fragility of Digital Heritage February 11, 2026
    Saturday 28 October 2023 is a date that will live long in the memory of staff at the British Library. As they arrived for work that day, they encountered chaos taking place. Servers were no longer online. Crucial systems were encrypted. And digital catalogues had disappeared altogether. A cultural institution renowned all over the world, […]
    Kashif Nazir
  • Why Traditional Cyber Risk Management Is No Longer Enough in 2026 February 10, 2026
    As we settle into 2026, the cybersecurity industry is experiencing dramatic change. AI, AI agents, Quantum, and even traditional attack techniques are developing in ways that impact how we protect our organisations and even how we communicate with our customers. Preserving the status quo simply isn’t good enough, so evolving our defences to not only […]
    Peter Jones
  • Substack Discloses Major Data Breach February 9, 2026
    Media platform Substack has disclosed a data breach that exposed email addresses, phone numbers, and internal metadata of an unknown number of users. Credit card numbers, passwords, and financial information were not accessed.  In an email, Substack CEO Chris Best informed affected users that on 3 February, the company found evidence pointing to a third party having […]
    Kirsten Doyle
  • The Winter Olympics Are Back, and So Are Attackers February 6, 2026
    The Olympics have traditionally been a major attack vector for cyber disruption, espionage, and financially motivated attacks.   The 2018 Winter Olympic Games in PyeongChang saw the Olympic Destroyer malware used to disrupt Wi-Fi, ticket, and venue systems during the opening ceremony of the games. During the Paris 2024 event, there was an increase in scanning, […]
    Kirsten Doyle
  • Rethinking the Security Estate: Why IT Spend Isn’t the Same as Cybersecurity Readiness February 5, 2026
    Cybersecurity spend is projected to reach $183 billion by 2028, but that growth masks a dangerous misconception. Many midmarket organizations equate rising IT budgets with improved security, assuming that broad spending on technology automatically translates to better protection. However, this is creating a widening gap between what companies perceive and their actual security readiness. IT […]
    Michael Gray
  • Microsoft: Python-Powered Infostealers Are Now Targeting macOS at Scale February 5, 2026
    Microsoft has warned that information-stealing attacks are rapidly expanding beyond Windows to target Apple macOS environments using cross-platform languages such as Python.  The software giant’s Defender Security Research Team has observed macOS-targeted infostealer campaigns using social engineering techniques like ClickFix since late 2025 to distribute disk image (DMG) installers that deploy stealer malware families like Atomic macOS Stealer (AMOS), MacSync, and DigitStealer.   The […]
    Kirsten Doyle
  • Forescout’s 2025 Threat Roundup: 84% OT Surge Signals Expanding Cyber Chaos February 5, 2026
    In 2025, attackers didn’t only target traditional areas of vulnerability; they went after those with the least defense and the most rapid change. These include new AI technologies, web applications, and operational technology (OT) for industries such as healthcare, manufacturing, energy, government, and finance.   In fact, attacks against OT protocol rose by a whopping 84% with Modbus, Ethernet/IP, and BACnet at the forefront. IoT exploits increased to 19%, hitting cameras and […]
    Kirsten Doyle
  • Notepad++ Update Hijacked in Six-Month, State-Linked Supply-Chain Attack February 3, 2026
    Attackers have hijacked the update mechanism of Notepad++, one of the world’s most popular open-source text editors, delivering  malware to targeted users over a period of six months.  In an advisory, developer Don Ho discussed how bad actors weaponized his two-decade-old project between June and December last year.  An update, said: “Multiple independent security researchers have assessed that the threat actor is likely a Chinese state-sponsored group, which would explain […]
    Kirsten Doyle

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc