Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Service Categories: Security Operations Center

VigilantAI > Services > Security Operations Center

Service Categories: Security Operations Center

Yara Integrity monitoring
  • gurushyam.mony
  • September 14, 2022
  • No Comments

Network Intrusion & Detection

Recent Posts

  • Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks
  • Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages
  • Hackers Using New QuirkyLoader Malware to Spread Agent Tesla, AsyncRAT and Snake Keylogger
  • Weak Passwords and Compromised Accounts: Key Findings from the Blue Report 2025
  • Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM Swapping Crypto Theft

Recent Comments

No comments to show.

Explore Categories

  • Blog 1,512

Recent Posts

img

Pre-Auth Exploit Chains Found in Commvault

August 21, 2025
img

Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix

August 21, 2025
img

Hackers Using New QuirkyLoader Malware to

August 21, 2025
img

Weak Passwords and Compromised Accounts: Key

August 21, 2025

RSS Cyber Security

  • Russian Espionage Group Exploits Old Cisco Flaw to Target Critical Infrastructure August 21, 2025
    The FBI and Cisco Talos have issued fresh warnings about a Russian cyber espionage campaign that has quietly compromised network devices around the world. The threat actor, tracked as Static Tundra, is linked to the Federal Security Service’s (FSB) Center 16 unit and has been active for more than a decade. At the heart of […]
    Kirsten Doyle
  • Patching for Persistence: DripDropper Malware Secures the Door It Broke Open August 21, 2025
    It sounds counterintuitive. An adversary exploits a system, gains access, and then patches the very hole they used to break in. Yet that is exactly what Red Canary researchers observed in a recent campaign targeting cloud-based Linux servers. The logic is simple. By fixing the exploited vulnerability, a malefactor can lock out rivals and mask […]
    Kirsten Doyle
  • Crypto Agility Under Pressure: Enterprises Lag on Certificates and Quantum Prep August 21, 2025
    A new report from Sectigo and Omdia reveals that enterprises are dangerously underprepared for two converging megatrends shaking the foundations of Public Key Infrastructure (PKI): the radical shortening of SSL/TLS certificate lifespans and the looming transition to post-quantum cryptography (PQC).  The State of Crypto Agility 2025 study, based on a survey of 272 IT decision-makers […]
    Josh Breaker Rolfe
  • Have I Been Pwned: Allianz Life Breach Impacts 1.1m August 21, 2025
    Have I Been Pwned has added Allianz Life to its breach notification database, confirming that cybercriminals compromised personal data belonging to more than 1.1 million individuals.   The breach stems from an attack on a cloud-based customer relationship management (CRM). Allianz Life disclosed the incident in a filing with the Maine attorney general’s office in late […]
    Josh Breaker Rolfe
  • Britain Drops Apple ‘Backdoor’ Demand After U.S. Pushback August 20, 2025
    Britain has abandoned its demand that Apple build a “backdoor” into its encryption systems. The change follows months of quiet talks between London and Washington, Reuters reports. In a statement posted on X, U.S. Director of National Intelligence Tulsi Gabbard, said: “As a result, the UK has agreed to drop its mandate for Apple to […]
    Kirsten Doyle
  • Colt Technology Services Battles Cyberattack, Faces Ongoing Outage August 20, 2025
    Colt Technology Services has been dealing with a cyberattack that has disrupted parts of its business for more than a week. The UK-based telecommunications firm, which operates in 30 countries and runs nearly 50,000 miles of fiber connecting 900 data centers, confirmed that several internal support systems remain offline.   The incident began on 12 August, […]
    Kirsten Doyle
  • AI is a Security Analyst’s Copilot, Not a Replacement August 19, 2025
    AI has fundamentally changed cybersecurity. Even the most primitive attackers are now capable of launching attacks at an unprecedented speed, frequency, and level of sophistication. As a result, defenders are under more pressure than ever.   Often, when we talk about AI, we talk about its potential to put people out of work. This is perhaps […]
    Josh Breaker Rolfe
  • Workday Confirms Data Breach After Social-Engineering Attack on Third‑Party CRM August 19, 2025
    Workday, a cloud-based platform used for human capital managment and financial management, has disclosed a data breach after attackers gained access to a third-party CRM platform in a recent social engineering attack.  The company said bad actors contacted employees by text or phone, pretending to be from HR or IT. Their goal was to fool […]
    Kirsten Doyle
  • SAP NetWeaver: CVE-2025-31324 Now Exploitable at Scale August 19, 2025
    In April 2025, SAP patched a critical vulnerability in NetWeaver AS Java Visual Composer. The flaw, tracked as CVE-2025-31324, allows unauthenticated remote code execution through the Visual Composer “metadata uploader” endpoint. Within weeks, proof-of-concept code appeared in public forums. Now, the exploit is no longer theoretical. Full tooling has been released. Source code is out […]
    Kirsten Doyle
  • UK Businesses Hit by Wave of Breaches Caused by Insecure Code August 19, 2025
    A new survey has revealed the extent to which poor coding practices are leaving UK businesses exposed. Two-thirds of senior technology leaders admitted their organisations suffered at least one breach or serious security incident in the past year. The common cause: insecure code. SecureFlag’s research found that of the 100 executives surveyed, nearly half reported […]
    Kirsten Doyle

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc