Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Category: Blog

VigilantAI > Blog > Blog

Category: Blog

Your blog category

  • March 5, 2025
  • No Comments

China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access

  • March 5, 2025
  • No Comments

Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud

  • March 5, 2025
  • No Comments

Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin America

  • March 5, 2025
  • No Comments

Defending against USB drive attacks with Wazuh

  • March 5, 2025
  • No Comments

Identity: The New Cybersecurity Battleground

  • March 5, 2025
  • No Comments

Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants

  • March 5, 2025
  • No Comments

Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems

  • March 4, 2025
  • No Comments

Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates

  • March 4, 2025
  • No Comments

VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches

  • March 4, 2025
  • No Comments

How New AI Agents Will Transform Credential Stuffing Attacks

  • Prev
  • 1
  • …
  • 61
  • 62
  • 63
  • 64
  • 65
  • …
  • 131
  • Next

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Securing Data in the AI Era

Recent Comments

No comments to show.

Explore Categories

  • Blog 1,310

Recent Posts

img

Fortinet Releases Patch for Critical SQL

July 11, 2025
img

PerfektBlue Bluetooth Vulnerabilities Expose Millions of

July 11, 2025
img

Iranian-Backed Pay2Key Ransomware Resurfaces with 80%

July 11, 2025
img

Securing Data in the AI Era

July 11, 2025

RSS Cyber Security

  • Dynamic Data Masking: Enhancing Data Security in Real-Time July 11, 2025
    In today’s data-driven world, organizations must protect vital information from unauthorized access by enabling users to see only the details permitted by their roles. Dynamic Data Masking (DDM) allows real-time data modifications without altering stored content, helping organizations meet regulatory requirements and guard against insider and external threats. This article explores key principles, deployment methods, […]
    Arfi Siddik Mollashaik
  • Can Overreliance on GenAI Pose a Security Risk? July 11, 2025
    The intersection of AI in digital marketing poses uncharted cybersecurity concerns for businesses globally. We spoke to Justin Aldridge, Technical Director at Artemis Marketing, to find out what organizations need to know. As generative AI (GenAI) continues to transform how organizations approach operations, questions remain about AI’s propensity to aggregate, store, and misrepresent our data. […]
    Chester Avey
  • Iran Threat Report: Ideology, Cyber Power, and the Quiet War on UK Soil July 11, 2025
    Iran doesn’t need to fire missiles to be dangerous. It already sees the UK as a threat. And it’s acting accordingly. That’s the clear warning from Parliament’s Intelligence and Security Committee in its July 2025 report. Drawing on classified material, the report exposes Iran’s deep-rooted hostility to the West, and how that ideology is driving […]
    Kirsten Doyle
  • Cyber Threats Surge as Digital Factories Fuel Risk in European Manufacturing July 11, 2025
    Europe’s manufacturing sector is under siege. A new report from KnowBe4, released this week, lays bare the growing cyber vulnerabilities facing the continent’s increasingly digitalised production lines. Titled Securing Manufacturing’s Digital Future, the report paints a stark picture: as factories adopt smarter, more connected systems, they are becoming prime targets for ransomware gangs and social […]
    Kirsten Doyle
  • The Evolving Importance of Identity Governance in FinTech July 10, 2025
    In the rapidly evolving FinTech landscape, data is power, and access to this data must be seamless but at the same time secure. FinTech companies offer novel services to sizable consumers; however, they must secure sensitive financial information against breaches, fraud, and any regulatory violations. The data security requires managing access privileges for internal employees, […]
    Anant Wairagade
  • ServiceNow Fixes High-Severity Data Leak Flaw After Varonis Uncovers ‘Count(er) Strike)’ July 10, 2025
    A high-severity vulnerability in the ServiceNow platform could have exposed vast amounts of sensitive data to low-privileged or even anonymous users. Researchers at Varonis Threat Labs discovered the issue, dubbed Count(er) Strike, which exploits a flaw in how the system displays record counts, offering attackers a quiet but powerful method of data inference and exfiltration. […]
    Kirsten Doyle
  • Google’s Gemini Can Now Access WhatsApp by Default, Even If Tracking Is Off July 10, 2025
    Google has quietly switched on default access for its Gemini AI to interact with apps like WhatsApp, even if you previously told it not to. Android users began receiving emails last week alerting them that Gemini now has broader access to their phones. As of 9 July, the AI assistant can read and act on […]
    Kirsten Doyle
  • M&S Chair Admits Devastating Cyberattack but Refuses to Say if Ransom Was Paid July 10, 2025
    Marks & Spencer chairman Archie Norman has faced tough questions in Parliament after a cyberattack that paralysed the British retailer’s digital operations for months and is expected to cost the company £300 million in lost profits. Appearing before the Business and Trade Committee on 8 July, Norman described the breach as “devastating” but refused to […]
    Kirsten Doyle
  • AI Impersonator Posed as Secretary of State Rubio to Target World Leaders July 9, 2025
    An unidentified individual used artificial intelligence to impersonate U.S. Secretary of State Marco Rubio, contacting foreign ministers, a U.S. governor, and a member of Congress via voice and text messages, according to a State Department cable first seen by The Washington Post. The impersonator cloned Rubio’s voice using AI-powered software, then reached out through Signal, […]
    Kirsten Doyle
  • Tax Credit Consultancy Exposes Nearly 250,000 Records in Major Data Breach July 9, 2025
    A tax credit consulting firm seems to have exposed the personal data of thousands of Americans after leaving a slew of sensitive documents unprotected online. The breach was discovered by cybersecurity researcher Jeremiah Fowler, who reported his findings to vpnMentor.  As outlined by Fowler, the unencrypted, non-password-protected database contained 245,949 records, which translated to nearly […]
    Kirsten Doyle

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc