Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Category: Blog

VigilantAI > Blog > Blog

Category: Blog

Your blog category

  • April 14, 2025
  • No Comments

ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading

  • April 14, 2025
  • No Comments

Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft

  • April 14, 2025
  • No Comments

⚡ Weekly Recap: Windows 0-Day, VPN Exploits, Weaponized AI, Hijacked Antivirus and More

  • April 14, 2025
  • No Comments

Cybersecurity in the AI Era: Evolve Faster Than the Threats or Get Left Behind

  • April 14, 2025
  • No Comments

Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RAT

  • April 11, 2025
  • No Comments

Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit

  • April 11, 2025
  • No Comments

Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors

  • April 11, 2025
  • No Comments

Initial Access Brokers Shift Tactics, Selling More for Less

  • April 11, 2025
  • No Comments

Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways

  • April 11, 2025
  • No Comments

SpyNote, BadBazaar, MOONSHINE Malware Target Android and iOS Users via Fake Apps

  • Prev
  • 1
  • …
  • 40
  • 41
  • 42
  • 43
  • 44
  • …
  • 130
  • Next

Recent Posts

  • Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
  • Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • BaitTrap: Over 17,000 Fake News Websites Caught Fueling Investment Fraud Globally
  • RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

Recent Comments

No comments to show.

Explore Categories

  • Blog 1,291

Recent Posts

img

Hackers Use Leaked Shellter Tool License

July 08, 2025
img

Anatsa Android Banking Trojan Hits 90,000

July 08, 2025
img

Malicious Pull Request Targets 6,000+ Developers

July 08, 2025
img

RondoDox Botnet Exploits Flaws in TBK

July 08, 2025

RSS Cyber Security

  • Mitigating the Toxic Cloud Trilogy to Empower Everyone from the Most to the Least Tech-Savvy July 8, 2025
    Cloud computing has its perks: speed, scalability, and innovation, to name just a few. However, increasing reliance on cloud computing has changed the threat landscape and created substantial points of vulnerability.   The toxic cloud trilogy of cloud workload risks – those that are publicly exposed, critically vulnerable, and highly privileged – represents the most dangerous.   […]
    Josh Breaker Rolfe
  • Ransomware Attack Cripples Ingram Micro, Disrupts Global Services July 8, 2025
    Ingram Micro has confirmed a ransomware attack that has forced systems offline and disrupted core services across its global operations. The breach, first reported as an unexplained outage on 3 July has now been linked to the SafePay ransomware group, one of the more active players in the 2025 threat landscape. By 6 July, the […]
    Kirsten Doyle
  • Stolen Identities Now the Biggest Threat in Cybersecurity July 8, 2025
    The biggest threat to your business may no longer be malware or ransomware. It’s your people. Or rather, their identities. Between 2023 and the first quarter of 2025, identity-driven threats surged by 156%, now accounting for 59% of all confirmed cyber incidents, according to new research by eSentire’s Threat Response Unit (TRU). The findings mark […]
    Kirsten Doyle
  • Ransomware in 2025: More Attacks, Bigger Targets, Fewer Confirmations July 7, 2025
    The ransomware crisis continues to deepen. In the first half of 2025, 3,627 attacks were logged worldwide, a 47% jump from the same period last year. But confirmation remains scarce. According to Comparitech, of those incidents, just 445 were publicly acknowledged by victims. The rest were claimed by threat actors on their leak sites, often […]
    Kirsten Doyle
  • Scattered Spider’s Pre-Attack Infrastructure Exposed: 500+ Phishing Domains Mimic Enterprise Logins July 7, 2025
    The infamous cybercrime group known as Scattered Spider is expanding its playbook, and laying the groundwork long before the breach. New findings from Check Point Research reveal a sprawling infrastructure of more than 500 phishing domains, many designed to impersonate enterprise login pages. It’s a quiet phase of attack planning, but one that holds critical […]
    Kirsten Doyle
  • Stop Ransomware in Its Tracks with Exfiltration Prevention July 7, 2025
    Ransomware attacks have not only increased in numbers, but they have also evolved beyond data encryption and ransoms. Today’s attackers are increasingly turning to double or even triple extortion, extracting sensitive information to increase their leverage. According to the 2025 Verizon DBIR, 90% of ransomware attacks involved data exfiltration in 2024, up from 85% in 2023 […]
    Brad LaPorte
  • From Manual to Mindful: Elevating IT Support in the Age of Intelligent Automation July 4, 2025
    Across industries, IT support is undergoing a quiet revolution. While it once meant a reactive help desk resolving tickets on a first-come, first-served basis, today’s model is more proactive, data-driven, and increasingly powered by AI. At the centre of this shift are small and mid-sized enterprises (SMEs), which face a unique set of challenges: tighter […]
    Robert Phan
  • Critical Cisco Flaw Lets Attackers Gain Root Access to Unified CM July 4, 2025
    Cisco has patched a critical flaw in its Unified Communications Manager (Unified CM) software that allowed unauthenticated remote attackers to log in using hardcoded root credentials. The vulnerability, tracked as CVE-2025-20309, carries a CVSS score of 10.0 (the highest possible) and affects select engineering special (ES) builds of version 15.0.  The issue stems from development […]
    Kirsten Doyle
  • Ransomware Group Hunters International Claims Shutdown, Offers Free Decryptors July 4, 2025
    Hunters International, a notorious ransomware gang with ties to past high-profile cyberattacks, says it’s closing shop. The group made the announcement Thursday via its darknet extortion site, claiming it would release free decryption tools to help past victims recover data.  “After careful consideration and in light of recent developments, we have decided to close the […]
    Kirsten Doyle
  • Iranian Cyber Threats Surge Amid Geopolitical Tension July 4, 2025
    Cyberattacks linked to Iranian threat groups are on the rise, according to a new threat intelligence report from security provider Blumira. The report highlights how escalating geopolitical tensions between the US and Iran are driving a surge in Iranian state-linked cybers activity, particularly targeting critical sectors like healthcare, energy, and government.   Blumira, which monitors threats […]
    Josh Breaker Rolfe

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc