Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Service Categories: Cyber Data Analytics

VigilantAI > Services > Cyber Data Analytics

Service Categories: Cyber Data Analytics

Vigilant AI Product Dashboard
  • gurushyam.mony
  • September 14, 2022
  • No Comments

A.I. Threat Hunting & Forensics

Recent Posts

  • CISA Warns of Zimbra, SharePoint Flaw Exploits; Cisco Zero-Day Hit in Ransomware Attacks
  • OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs
  • Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access
  • 9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors
  • Claude Code Security and Magecart: Getting the Threat Model Right

Recent Comments

No comments to show.

Explore Categories

  • Blog 2,544

Recent Posts

img

CISA Warns of Zimbra, SharePoint Flaw

March 19, 2026
img

OFAC Sanctions DPRK IT Worker Network

March 18, 2026
img

Interlock Ransomware Exploits Cisco FMC Zero-Day

March 18, 2026
img

9 Critical IP KVM Flaws Enable

March 18, 2026

RSS Cyber Security

  • Delegated Trust Is Becoming the Largest Attack Surface in Modern Security March 18, 2026
    Over the next decade, the way we define security failures is going to change. No longer will it begin with an unpatched server or a careless employee clicking the wrong link. The root cause will be something far more ordinary, yet harder to see: third-party services. Right now, organizations are allowing outside services to sit […]
    Clarence Chio
  • UK’s Companies House exposed data linked to millions of firms March 18, 2026
    Companies House, the UK’s official registrar of companies, has disclosed a security flaw in its WebFiling service that exposed sensitive data tied to more than five million registered businesses.   The issue traces back to a system update rolled out in October 2025 and went unnoticed for five months before it was flagged.  The vulnerability meant logged-in users could access other companies’ records simply […]
    Kirsten Doyle
  • Cyberattacks Soar 245% as War Triggers Global Digital Offensive March 18, 2026
    Since the outbreak of the Middle East conflict on 28 February 2026, Akamai has seen a surge of 245% in cyberattacks against key businesses and institutions in North America, Europe, and some Asian Pacific countries.  One group in particular, Handala (widely believed to have ties to Iranian intelligence) has claimed responsibility for a destructive data-wiping attack on Stryker, the global […]
    Kirsten Doyle
  • ‘CrackArmor’ Exposes Nine Vulnerabilities in Linux AppArmor March 18, 2026
    The Qualys Threat Research Unit (TRU) has identified nine vulnerabilities in AppArmor, a Linux Security Module.   The vulnerability has been present since 2017 (version v4.11). AppArmor is the default mandatory access control system for Ubuntu, Debian, SUSE, and several cloud platforms. Its presence in all these systems and its use in all these platforms make the threat landscape much wider.   […]
    Kirsten Doyle
  • ShinyHunters Claims It Stole 1PB of Data from TELUS Digital March 17, 2026
    TELUS Digital has fallen victim to a security incident in which unsanctioned actors accessed its systems.   Upon learning of this incident, the company said it took immediate action to resolve it and prevent any future breaches of its systems and environment. “All business operations within TELUS Digital remain fully operational, and there is no evidence of […]
    Kirsten Doyle
  • Why OSINT deserves the same status as other intelligence disciplines March 17, 2026
    Open source intelligence (OSINT) still sits outside the intelligence mainstream. If you’re not acquainted with the intelligence profession, you might not have come across the term at all. OSINT is the targeted collection and analysis of publicly available or licensable data to generate actionable intelligence. The discipline is a critical tool for combating crime and […]
    Chris P.
  • A Latte Trouble: Starbucks HR Accounts Hit in Credential Theft Incident March 16, 2026
    Starbucks has disclosed a data breach attackers gained access to hundreds of employees’ Starbucks Partner Central accounts, which are used for managing employment information, personal data, benefits, and HR information.  In a letter sent to affected staff members, the company said: “On or about February 6, 2026, Starbucks Corporation (“Starbucks” or “we”) became aware of potential unauthorized access […]
    Kirsten Doyle
  • The AI Doomsday Clock: When AI Becomes a Business Dependency, Not a Tool March 16, 2026
    Most conversations about AI in business start with the wrong question of “Can AI do the job?” It is entirely the wrong place to start. The real question for leadership is quieter but vastly more important…“Will this platform still exist, function, and be supportable when the AI bubble shifts?” Right now, many organizations are not […]
    Gene Moody
  • Researchers Show How “AI Judges” Can Be Tricked Into Approving Harmful Content March 13, 2026
    Security researchers have demonstrated how a growing class of AI safety controls (known as AI judges) can be manipulated into approving content they are supposed to block.  In new research published by cybersecurity firm Palo Alto Networks’ threat intelligence team Unit 42, analysts describe how automated “fuzzing” techniques can uncover hidden weaknesses in the large language models that many organizations […]
    Kirsten Doyle
  • Cutting Into Overtime, Not Corners: How Network Automation Drives Business Value March 13, 2026
    “You’re cutting into my overtime. But if I can schedule upgrades to happen overnight and sleep better, I’m in!” This is what a network engineer recently told me as I was discussing network automation. Network infrastructure owners I speak with are looking for ways to maximize the value from their investments. Meanwhile, their teams are […]
    Irfahn Khimji

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc