Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Category: Blog

VigilantAI > Blog > Blog

Category: Blog

Your blog category

  • November 21, 2025
  • No Comments

APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains

  • November 21, 2025
  • No Comments

Why IT Admins Choose Samsung for Mobile Security

  • November 21, 2025
  • No Comments

SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny

  • November 21, 2025
  • No Comments

Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity

  • November 20, 2025
  • No Comments

ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet

  • November 20, 2025
  • No Comments

Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows

  • November 20, 2025
  • No Comments

ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves

  • November 20, 2025
  • No Comments

CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat

  • November 20, 2025
  • No Comments

New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices

  • November 20, 2025
  • No Comments

Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt

  • Prev
  • 1
  • …
  • 39
  • 40
  • 41
  • 42
  • 43
  • …
  • 237
  • Next

Recent Posts

  • Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations
  • Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs
  • UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors
  • Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
  • npm’s Update to Harden Their Supply Chain, and Points to Consider

Recent Comments

No comments to show.

Explore Categories

  • Blog 2,369

Recent Posts

img

Google Links China, Iran, Russia, North

February 13, 2026
img

Google Ties Suspected Russian Actor to

February 13, 2026
img

UAT-9921 Deploys VoidLink Malware to Target

February 13, 2026
img

Malicious Chrome Extensions Caught Stealing Business

February 13, 2026

RSS Cyber Security

  • Closing the Cross-Platform Security Gap in Citizen Developer Apps February 13, 2026
    In many ways, managing security for citizen-developer apps is like flying several planes built by different manufacturers all at once. That’s because each no-code development platform uses separate dashboards, controls, policy engines, etc. Microsoft Power Platform measures altitude in feet, ServiceNow in meters, Salesforce reports it in knots, and UiPath wants to automate the landing […]
    Yair Finzi
  • The Top Pentesting Platforms of 2026: What You Need to Know February 11, 2026
    What to Look for in a Pentesting Platform? As the primary way of finding and exploiting vulnerabilities (before attackers do), pen testing platforms are a popular choice for businesses looking to launch sophisticated simulated attacks at scale. Here is a look at some of the top pen testing tools to watch in 2026, and what […]
    Joe Pettit
  • The Cyberattack That Exposed the Fragility of Digital Heritage February 11, 2026
    Saturday 28 October 2023 is a date that will live long in the memory of staff at the British Library. As they arrived for work that day, they encountered chaos taking place. Servers were no longer online. Crucial systems were encrypted. And digital catalogues had disappeared altogether. A cultural institution renowned all over the world, […]
    Kashif Nazir
  • Why Traditional Cyber Risk Management Is No Longer Enough in 2026 February 10, 2026
    As we settle into 2026, the cybersecurity industry is experiencing dramatic change. AI, AI agents, Quantum, and even traditional attack techniques are developing in ways that impact how we protect our organisations and even how we communicate with our customers. Preserving the status quo simply isn’t good enough, so evolving our defences to not only […]
    Peter Jones
  • Substack Discloses Major Data Breach February 9, 2026
    Media platform Substack has disclosed a data breach that exposed email addresses, phone numbers, and internal metadata of an unknown number of users. Credit card numbers, passwords, and financial information were not accessed.  In an email, Substack CEO Chris Best informed affected users that on 3 February, the company found evidence pointing to a third party having […]
    Kirsten Doyle
  • The Winter Olympics Are Back, and So Are Attackers February 6, 2026
    The Olympics have traditionally been a major attack vector for cyber disruption, espionage, and financially motivated attacks.   The 2018 Winter Olympic Games in PyeongChang saw the Olympic Destroyer malware used to disrupt Wi-Fi, ticket, and venue systems during the opening ceremony of the games. During the Paris 2024 event, there was an increase in scanning, […]
    Kirsten Doyle
  • Rethinking the Security Estate: Why IT Spend Isn’t the Same as Cybersecurity Readiness February 5, 2026
    Cybersecurity spend is projected to reach $183 billion by 2028, but that growth masks a dangerous misconception. Many midmarket organizations equate rising IT budgets with improved security, assuming that broad spending on technology automatically translates to better protection. However, this is creating a widening gap between what companies perceive and their actual security readiness. IT […]
    Michael Gray
  • Microsoft: Python-Powered Infostealers Are Now Targeting macOS at Scale February 5, 2026
    Microsoft has warned that information-stealing attacks are rapidly expanding beyond Windows to target Apple macOS environments using cross-platform languages such as Python.  The software giant’s Defender Security Research Team has observed macOS-targeted infostealer campaigns using social engineering techniques like ClickFix since late 2025 to distribute disk image (DMG) installers that deploy stealer malware families like Atomic macOS Stealer (AMOS), MacSync, and DigitStealer.   The […]
    Kirsten Doyle
  • Forescout’s 2025 Threat Roundup: 84% OT Surge Signals Expanding Cyber Chaos February 5, 2026
    In 2025, attackers didn’t only target traditional areas of vulnerability; they went after those with the least defense and the most rapid change. These include new AI technologies, web applications, and operational technology (OT) for industries such as healthcare, manufacturing, energy, government, and finance.   In fact, attacks against OT protocol rose by a whopping 84% with Modbus, Ethernet/IP, and BACnet at the forefront. IoT exploits increased to 19%, hitting cameras and […]
    Kirsten Doyle
  • Notepad++ Update Hijacked in Six-Month, State-Linked Supply-Chain Attack February 3, 2026
    Attackers have hijacked the update mechanism of Notepad++, one of the world’s most popular open-source text editors, delivering  malware to targeted users over a period of six months.  In an advisory, developer Don Ho discussed how bad actors weaponized his two-decade-old project between June and December last year.  An update, said: “Multiple independent security researchers have assessed that the threat actor is likely a Chinese state-sponsored group, which would explain […]
    Kirsten Doyle

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc