Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Category: Blog

VigilantAI > Blog > Blog

Category: Blog

Your blog category

  • March 26, 2025
  • No Comments

How PAM Mitigates Insider Threats: Preventing Data Breaches, Privilege Misuse, and More

  • March 26, 2025
  • No Comments

Hackers Using E-Crime Tool Atlantis AIO for Credential Stuffing on 140+ Platforms

  • March 26, 2025
  • No Comments

New Security Flaws Found in VMware Tools and CrushFTP — High Risk, No Workaround

  • March 26, 2025
  • No Comments

Zero-Day Alert: Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks

  • March 25, 2025
  • No Comments

Researchers Uncover ~200 Unique C2 Domains Linked to Raspberry Robin Access Broker

  • March 25, 2025
  • No Comments

AI-Powered SaaS Security: Keeping Pace with an Expanding Attack Surface

  • March 25, 2025
  • No Comments

Chinese Hackers Breach Asian Telecom, Remain Undetected for Over 4 Years

  • March 25, 2025
  • No Comments

Hackers Use .NET MAUI to Target Indian and Chinese Users with Fake Banking, Social Apps

  • March 25, 2025
  • No Comments

INTERPOL Arrests 306 Suspects, Seizes 1,842 Devices in Cross-Border Cybercrime Bust

  • March 24, 2025
  • No Comments

Critical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication

  • Prev
  • 1
  • …
  • 50
  • 51
  • 52
  • 53
  • 54
  • …
  • 130
  • Next

Recent Posts

  • Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targets
  • DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware
  • How To Automate Ticket Creation, Device Identification and Threat Triage With Tines
  • U.S. Sanctions North Korean Andariel Hacker Behind Fraudulent IT Worker Scheme
  • Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks

Recent Comments

No comments to show.

Explore Categories

  • Blog 1,297

Recent Posts

img

Gold Melody IAB Exploits Exposed ASP.NET

July 09, 2025
img

DoNot APT Expands Operations, Targets European

July 09, 2025
img

How To Automate Ticket Creation, Device

July 09, 2025
img

U.S. Sanctions North Korean Andariel Hacker

July 09, 2025

RSS Cyber Security

  • AI Impersonator Posed as Secretary of State Rubio to Target World Leaders July 9, 2025
    An unidentified individual used artificial intelligence to impersonate U.S. Secretary of State Marco Rubio, contacting foreign ministers, a U.S. governor, and a member of Congress via voice and text messages, according to a State Department cable first seen by The Washington Post. The impersonator cloned Rubio’s voice using AI-powered software, then reached out through Signal, […]
    Kirsten Doyle
  • Tax Credit Consultancy Exposes Nearly 250,000 Records in Major Data Breach July 9, 2025
    A tax credit consulting firm seems to have exposed the personal data of thousands of Americans after leaving a slew of sensitive documents unprotected online. The breach was discovered by cybersecurity researcher Jeremiah Fowler, who reported his findings to vpnMentor.  As outlined by Fowler, the unencrypted, non-password-protected database contained 245,949 records, which translated to nearly […]
    Kirsten Doyle
  • CISA Flags Four Actively Exploited Flaws, Urges Swift Remediation July 9, 2025
    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added four more security flaws to its Known Exploited Vulnerabilities (KEV) Catalog, citing clear evidence of active exploitation in the wild.  The latest additions span a range of technologies, some dating back more than a decade. The vulnerabilities are:  CVE-2014-3931 (CVSS score: 9.8) – A buffer […]
    Kirsten Doyle
  • Mitigating the Toxic Cloud Trilogy to Empower Everyone from the Most to the Least Tech-Savvy July 8, 2025
    Cloud computing has its perks: speed, scalability, and innovation, to name just a few. However, increasing reliance on cloud computing has changed the threat landscape and created substantial points of vulnerability.   The toxic cloud trilogy of cloud workload risks – those that are publicly exposed, critically vulnerable, and highly privileged – represents the most dangerous.   […]
    Josh Breaker Rolfe
  • Ransomware Attack Cripples Ingram Micro, Disrupts Global Services July 8, 2025
    Ingram Micro has confirmed a ransomware attack that has forced systems offline and disrupted core services across its global operations. The breach, first reported as an unexplained outage on 3 July has now been linked to the SafePay ransomware group, one of the more active players in the 2025 threat landscape. By 6 July, the […]
    Kirsten Doyle
  • Stolen Identities Now the Biggest Threat in Cybersecurity July 8, 2025
    The biggest threat to your business may no longer be malware or ransomware. It’s your people. Or rather, their identities. Between 2023 and the first quarter of 2025, identity-driven threats surged by 156%, now accounting for 59% of all confirmed cyber incidents, according to new research by eSentire’s Threat Response Unit (TRU). The findings mark […]
    Kirsten Doyle
  • Ransomware in 2025: More Attacks, Bigger Targets, Fewer Confirmations July 7, 2025
    The ransomware crisis continues to deepen. In the first half of 2025, 3,627 attacks were logged worldwide, a 47% jump from the same period last year. But confirmation remains scarce. According to Comparitech, of those incidents, just 445 were publicly acknowledged by victims. The rest were claimed by threat actors on their leak sites, often […]
    Kirsten Doyle
  • Scattered Spider’s Pre-Attack Infrastructure Exposed: 500+ Phishing Domains Mimic Enterprise Logins July 7, 2025
    The infamous cybercrime group known as Scattered Spider is expanding its playbook, and laying the groundwork long before the breach. New findings from Check Point Research reveal a sprawling infrastructure of more than 500 phishing domains, many designed to impersonate enterprise login pages. It’s a quiet phase of attack planning, but one that holds critical […]
    Kirsten Doyle
  • Stop Ransomware in Its Tracks with Exfiltration Prevention July 7, 2025
    Ransomware attacks have not only increased in numbers, but they have also evolved beyond data encryption and ransoms. Today’s attackers are increasingly turning to double or even triple extortion, extracting sensitive information to increase their leverage. According to the 2025 Verizon DBIR, 90% of ransomware attacks involved data exfiltration in 2024, up from 85% in 2023 […]
    Brad LaPorte
  • From Manual to Mindful: Elevating IT Support in the Age of Intelligent Automation July 4, 2025
    Across industries, IT support is undergoing a quiet revolution. While it once meant a reactive help desk resolving tickets on a first-come, first-served basis, today’s model is more proactive, data-driven, and increasingly powered by AI. At the centre of this shift are small and mid-sized enterprises (SMEs), which face a unique set of challenges: tighter […]
    Robert Phan

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc