Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Category: Blog

VigilantAI > Blog > Blog

Category: Blog

Your blog category

  • June 9, 2025
  • No Comments

⚡ Weekly Recap: Chrome 0-Day, Data Wipers, Misused Tools and Zero-Click iPhone Attacks

  • June 9, 2025
  • No Comments

OpenAI Bans ChatGPT Accounts Used by Russian, Iranian and Chinese Hacker Groups

  • June 8, 2025
  • No Comments

New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions Globally

  • June 8, 2025
  • No Comments

Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025

  • June 6, 2025
  • No Comments

New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users

  • June 6, 2025
  • No Comments

Microsoft Helps CBI Dismantle Indian Call Centers Behind Japanese Tech Support Scam

  • June 6, 2025
  • No Comments

Empower Users and Protect Against GenAI Data Loss

  • June 6, 2025
  • No Comments

Inside the Mind of the Adversary: Why More Security Leaders Are Selecting AEV

  • June 6, 2025
  • No Comments

New PathWiper Data Wiper Malware Disrupts Ukrainian Critical Infrastructure in 2025 Attack

  • June 5, 2025
  • No Comments

Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials

  • Prev
  • 1
  • …
  • 38
  • 39
  • 40
  • 41
  • 42
  • …
  • 154
  • Next

Recent Posts

  • ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots
  • The 5 Golden Rules of Safe AI Adoption
  • Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra
  • Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data
  • New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station

Recent Comments

No comments to show.

Explore Categories

  • Blog 1,536

Recent Posts

img

ShadowSilk Hits 36 Government Targets in

August 27, 2025
img

The 5 Golden Rules of Safe

August 27, 2025
img

Blind Eagle’s Five Clusters Target Colombia

August 27, 2025
img

Salesloft OAuth Breach via Drift AI

August 27, 2025

RSS Cyber Security

  • Malicious Go Module Sends Stolen SSH Credentials to Telegram August 26, 2025
    A Go package disguised as an SSH brute forcer has been caught stealing credentials and sending them straight to a Telegram bot controlled by a Russian-speaking threat actor. Socket’s Threat Research Team found the package, called golang-random-ip-ssh-bruteforce, still live on GitHub and the Go Module registry. It claims to be a “fast” SSH brute forcer. […]
    Kirsten Doyle
  • The Technologies Redefining UK, European, and NATO Defence August 26, 2025
    The United Kingdom is sharpening its defence posture. Five technologies stand at the heart of this effort. While the industry’s heavyweights continue to supply capability, fresh value lies with early to mid-stage firms. These smaller players, often led by veterans and security professionals, move fast. They innovate, adapt, and bring new answers to complex military […]
    Kirsten Doyle
  • Reflections on the Web: Threats, AI, and the Road Ahead August 26, 2025
    The web began quietly. A few servers, a handful of users, a few ideas. It promised knowledge at the speed of light. But as the connections multiplied, so did the shadows. Each innovation brings progress, but also vulnerability. Today, the internet is no longer a tool; it is a living, sprawling ecosystem. And its evolution […]
    Kirsten Doyle
  • CrowdStrike Thwarts Malvertising Drive for SHAMOS on macOS August 25, 2025
    Between June and August this year, CrowdStrike’s Falcon platform stopped a coordinated malware campaign aimed at more than 300 customer environments. The operation involved SHAMOS, a variant of the Atomic macOS Stealer (AMOS), built and rented out by the cybercriminal group COOKIE SPIDER. The scheme was simple. Malvertising lured users searching for macOS fixes to […]
    Kirsten Doyle
  • Ransomware Surges as AI Drives New Cyber Threats August 25, 2025
    The number of publicly known ransomware victims jumped early 70% compared to the same period in 2023 and 2024, according to the newly released Acronis Cyberthreats Report H1 2025.   The surge underscores ransomware’s continuing grip on businesses worldwide, especially as attackers increasingly exploit AI to sharpen their tactics.   While the endgame for cybercriminals is still […]
    Josh Breaker Rolfe
  • Out of Office, Not Out of Mind: Staying Cyber-Smart Over the Holidays August 22, 2025
    We’re back with another expert interview! This time, we’re joined by Matt Warner, CEO and co-founder of Blumira, to talk about how businesses can stay ahead of cyber threats during the summer months and why this quieter season might be the best time to strengthen their security defenses. It’s the holiday season, and attacks often […]
    Dilki Rathnayake
  • Cybercrime Is Hiring: AI, IoT, and Cloud Experts Power the Next Wave of Attacks August 22, 2025
    The dark web has its own job boards. Its own recruiters. Its own economy of skills.  There, posts read like the listings on LinkedIn or Indeed, only the roles are not for project managers or analysts. They are for AI specialists, cloud exploiters, and social engineers fluent in English. The recruits are not employees. They […]
    Kirsten Doyle
  • From VPS to Phishing: Darktrace Exposes SaaS Hijacks through Virtual Infrastructure Abuse August 22, 2025
    Darktrace has uncovered a coordinated campaign of SaaS account takeovers. Attackers hid behind Virtual Private Servers, slipping into accounts, moving unseen, and wiping away the traces of phishing. The pattern was consistent: suspicious logins from VPS-linked infrastructure, swift creation of inbox rules, and deleted emails, particularly those tied to phishing. What researchers found was a […]
    Kirsten Doyle
  • Scamlexity: When AI Agents Become the Target, Not Just the Human August 22, 2025
    AI Browsers promise a future where an Agentic AI can handle your online life. From shopping to emails, they are designed to act autonomously, to save time, to make life easier. Yet convenience has a price. Recent researach by Guardio reveals a worrying truth: security guardrails are inconsistent, sometimes absent entirely. The AI clicks, pays, […]
    Kirsten Doyle
  • Manufacturers Scramble to Adopt AI as Cyber Threats Escalate August 22, 2025
    Cybersecurity has risen to the top of the manufacturing industry’s risk agenda. A new report from Rockwell Automation reveals that 61% of IT and security professionals plan to adopt AI and machine learning (ML) for cyber defense in the next year – 12 points ahead of general AI adoption across the sector.   Meanwhile, 30% of […]
    Josh Breaker Rolfe

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc