Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Category: Blog

VigilantAI > Blog > Blog

Category: Blog

Your blog category

  • April 18, 2025
  • No Comments

Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader

  • April 18, 2025
  • No Comments

[Webinar] AI Is Already Inside Your SaaS Stack — Learn How to Prevent the Next Silent Breach

  • April 18, 2025
  • No Comments

Experts Uncover New XorDDoS Controller, Infrastructure as Malware Expands to Docker, Linux, IoT

  • April 18, 2025
  • No Comments

CVE-2025-24054 Under Active Attack—Steals NTLM Credentials on File Download

  • April 17, 2025
  • No Comments

Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates

  • April 17, 2025
  • No Comments

State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns

  • April 17, 2025
  • No Comments

Artificial Intelligence – What’s all the fuss?

  • April 17, 2025
  • No Comments

Blockchain Offers Security Benefits – But Don’t Neglect Your Passwords

  • April 17, 2025
  • No Comments

Node.js Malware Campaign Targets Crypto Users with Fake Binance and TradingView Installers

  • April 17, 2025
  • No Comments

Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code Execution

  • Prev
  • 1
  • …
  • 68
  • 69
  • 70
  • 71
  • 72
  • …
  • 160
  • Next

Recent Posts

  • Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks
  • RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities
  • [Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them
  • TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs
  • From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks

Recent Comments

No comments to show.

Explore Categories

  • Blog 1,598

Recent Posts

img

Axios Abuse and Salty 2FA Kits

September 09, 2025
img

RatOn Android Malware Detected With NFC

September 09, 2025
img

[Webinar] Shadow AI Agents Multiply Fast

September 09, 2025
img

From MostereRAT to ClickFix: New Malware

September 09, 2025

RSS Cyber Security

  • How to Protect Your VoIP System from DDoS Attacks September 9, 2025
    Imagine you walk into your office on a Monday morning. Phones are ringing nonstop, your sales team is preparing for a major client call, and support lines are stacked. There are no outgoing calls, and customers cannot reach you anymore. Then you think it’s a glitch, but it’s a VoIP DDoS attack, a cyberattack that […]
    Nnamani Chinwoke
  • MostereRAT Deploys AnyDesk and TightVNC for Full System Control September 9, 2025
    Bad actors are stepping up. FortiGuard Labs has uncovered a phishing campaign that installs MostereRAT, a remote access trojan built to evade defenses and seize full control of a machine.  The path is familiar. A phishing email lands in the inbox of a Japanese user. It looks like a business inquiry, routine and harmless. A […]
    Kirsten Doyle
  • Patch Now: Critical SAP S/4HANA Code Injection Flaw Exploited in the Wild September 8, 2025
    A newly disclosed vulnerability in SAP S/4HANA has been rated critical, with security researchers warning that exploitation is already underway.  The flaw, tracked as CVE-2025-42957, carries a CVSS score of 9.9 and affects S/4HANA systems running S4CORE versions 102 through 108, both in private cloud and on-premise deployments.   According to the official CVE record published […]
    Kirsten Doyle
  • Qantas Slashes Executive Bonuses After Cyber Breach September 8, 2025
    Qantas has cut short-term bonuses for its top executives by 15% in response to a customer data breach, even as the airline reported a strong year of profits.  CEO Vanessa Hudson saw her bonus reduced by about AUD 250,000 under the 2025 remuneration decisions, with the airline saying the adjustment reflected shared accountability across the […]
    Kirsten Doyle
  • The Six Cyber Weak Points Causing Power Grid Stress (And How to Fix Them) September 5, 2025
    The Industrial Internet of Things (IIoT) is altering power grid stress by straining outdated systems and broadening the cyberattack surface. With much of the infrastructure aging, the grid is left increasingly vulnerable to both physical and digital threats. Threat actors like hackers and other risks like natural disasters, and modernization have left utilities incoherent. Some […]
    Emily Newton
  • Attackers Exploit Grok AI to Spread Malware via Promoted Ads September 5, 2025
    Bad actors are exploiting Grok AI to push malware through promoted ads on X, in a scheme researchers are calling “Grokking.”  The method, uncovered by Guardio Labs researcher Nati Tal, takes advantage of how Grok parses hidden fields in ads.   Malvertisers post videos with adult content baits, but avoid direct links in the main body […]
    Kirsten Doyle
  • Users Share Personal, Emotional, Confidential Info with ChatGPT September 5, 2025
    ChatGPT users are routinely sharing personally identifiable information (PII), sensitive emotional disclosures, and confidential material with the AI platform, analysis from SafetyDetectives has revealed.   The cybersecurity reviewer’s deep dive into 1000s of ChatGPT conversations, leaked in August 2025, confirms what many already suspected: many internet users aren’t fully aware of how the AI model handles […]
    Josh Breaker Rolfe
  • Copilots to Agents: The Acceleration of AI-Driven Decision Making September 4, 2025
    GenAI is advancing at an unprecedented pace. Where Copilots once offered support and recommendations, we now witness the emergence of agentic AI. These systems can autonomously make decisions, complete intricate tasks, and interact seamlessly across platforms with limited human supervision. This transformation represents a major milestone for enterprise technology, presenting both vast opportunities and new […]
    Janne Saarela
  • From PowerShell to Payload: Darktrace Discovers Novel Cryptojacking Attack September 4, 2025
    In July 2025, Darktrace researchers detected an attempted cryptojacking incident on a retail and e-commerce network.   A desktop device initiated an HTTP connection to a rare endpoint, 45.141.87[.]195 over port 8000.   Embedded in the request was a PowerShell script, infect.ps1.   The script’s behavior flagged an immediate anomaly: a new PowerShell user agent making an unusual […]
    Kirsten Doyle
  • European Court Upholds EU-U.S. Data Privacy Framework, Clearing Path for Transatlantic Data Flows September 4, 2025
    The European General Court has backed the EU-U.S. Data Privacy Framework (DPF).   The ruling clears legal uncertainty for organisations moving data across the Atlantic. It upholds the European Commission’s adequacy decision, and confirms that the framework protects personal data while still enabling cross-border digital activity.  ITI and its members welcomed the decision. It provides clarity […]
    Kirsten Doyle

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc