Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Category: Blog

VigilantAI > Blog > Blog

Category: Blog

Your blog category

  • January 20, 2025
  • No Comments

Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP

  • January 19, 2025
  • No Comments

TikTok Goes Dark in the U.S. as Federal Ban Takes Effect January 19, 2025

  • January 18, 2025
  • No Comments

U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Silk Typhoon

  • January 17, 2025
  • No Comments

Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation

  • January 17, 2025
  • No Comments

Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation

  • January 17, 2025
  • No Comments

U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs

  • January 17, 2025
  • No Comments

New ‘Sneaky 2FA’ Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass

  • January 17, 2025
  • No Comments

How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal?

  • January 17, 2025
  • No Comments

European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China

  • January 16, 2025
  • No Comments

Russian Star Blizzard Shifts Tactics to Exploit WhatsApp QR Codes for Credential Harvesting

  • Prev
  • 1
  • …
  • 84
  • 85
  • 86
  • 87
  • 88
  • …
  • 132
  • Next

Recent Posts

  • GPUHammer: New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs
  • Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHub
  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals

Recent Comments

No comments to show.

Explore Categories

  • Blog 1,312

Recent Posts

img

GPUHammer: New RowHammer Attack Variant Degrades

July 12, 2025
img

Over 600 Laravel Apps Exposed to

July 12, 2025
img

Fortinet Releases Patch for Critical SQL

July 11, 2025
img

PerfektBlue Bluetooth Vulnerabilities Expose Millions of

July 11, 2025

RSS Cyber Security

  • Dynamic Data Masking: Enhancing Data Security in Real-Time July 11, 2025
    In today’s data-driven world, organizations must protect vital information from unauthorized access by enabling users to see only the details permitted by their roles. Dynamic Data Masking (DDM) allows real-time data modifications without altering stored content, helping organizations meet regulatory requirements and guard against insider and external threats. This article explores key principles, deployment methods, […]
    Arfi Siddik Mollashaik
  • Can Overreliance on GenAI Pose a Security Risk? July 11, 2025
    The intersection of AI in digital marketing poses uncharted cybersecurity concerns for businesses globally. We spoke to Justin Aldridge, Technical Director at Artemis Marketing, to find out what organizations need to know. As generative AI (GenAI) continues to transform how organizations approach operations, questions remain about AI’s propensity to aggregate, store, and misrepresent our data. […]
    Chester Avey
  • Iran Threat Report: Ideology, Cyber Power, and the Quiet War on UK Soil July 11, 2025
    Iran doesn’t need to fire missiles to be dangerous. It already sees the UK as a threat. And it’s acting accordingly. That’s the clear warning from Parliament’s Intelligence and Security Committee in its July 2025 report. Drawing on classified material, the report exposes Iran’s deep-rooted hostility to the West, and how that ideology is driving […]
    Kirsten Doyle
  • Cyber Threats Surge as Digital Factories Fuel Risk in European Manufacturing July 11, 2025
    Europe’s manufacturing sector is under siege. A new report from KnowBe4, released this week, lays bare the growing cyber vulnerabilities facing the continent’s increasingly digitalised production lines. Titled Securing Manufacturing’s Digital Future, the report paints a stark picture: as factories adopt smarter, more connected systems, they are becoming prime targets for ransomware gangs and social […]
    Kirsten Doyle
  • The Evolving Importance of Identity Governance in FinTech July 10, 2025
    In the rapidly evolving FinTech landscape, data is power, and access to this data must be seamless but at the same time secure. FinTech companies offer novel services to sizable consumers; however, they must secure sensitive financial information against breaches, fraud, and any regulatory violations. The data security requires managing access privileges for internal employees, […]
    Anant Wairagade
  • ServiceNow Fixes High-Severity Data Leak Flaw After Varonis Uncovers ‘Count(er) Strike)’ July 10, 2025
    A high-severity vulnerability in the ServiceNow platform could have exposed vast amounts of sensitive data to low-privileged or even anonymous users. Researchers at Varonis Threat Labs discovered the issue, dubbed Count(er) Strike, which exploits a flaw in how the system displays record counts, offering attackers a quiet but powerful method of data inference and exfiltration. […]
    Kirsten Doyle
  • Google’s Gemini Can Now Access WhatsApp by Default, Even If Tracking Is Off July 10, 2025
    Google has quietly switched on default access for its Gemini AI to interact with apps like WhatsApp, even if you previously told it not to. Android users began receiving emails last week alerting them that Gemini now has broader access to their phones. As of 9 July, the AI assistant can read and act on […]
    Kirsten Doyle
  • M&S Chair Admits Devastating Cyberattack but Refuses to Say if Ransom Was Paid July 10, 2025
    Marks & Spencer chairman Archie Norman has faced tough questions in Parliament after a cyberattack that paralysed the British retailer’s digital operations for months and is expected to cost the company £300 million in lost profits. Appearing before the Business and Trade Committee on 8 July, Norman described the breach as “devastating” but refused to […]
    Kirsten Doyle
  • AI Impersonator Posed as Secretary of State Rubio to Target World Leaders July 9, 2025
    An unidentified individual used artificial intelligence to impersonate U.S. Secretary of State Marco Rubio, contacting foreign ministers, a U.S. governor, and a member of Congress via voice and text messages, according to a State Department cable first seen by The Washington Post. The impersonator cloned Rubio’s voice using AI-powered software, then reached out through Signal, […]
    Kirsten Doyle
  • Tax Credit Consultancy Exposes Nearly 250,000 Records in Major Data Breach July 9, 2025
    A tax credit consulting firm seems to have exposed the personal data of thousands of Americans after leaving a slew of sensitive documents unprotected online. The breach was discovered by cybersecurity researcher Jeremiah Fowler, who reported his findings to vpnMentor.  As outlined by Fowler, the unencrypted, non-password-protected database contained 245,949 records, which translated to nearly […]
    Kirsten Doyle

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc