Logo
  • Home
  • About Us
  • Services
    • Service Details
  • Products
    • Vigilant AI
    • GeoRisk
  • Learn
    • Blogs
  • Contact Us
Logo

Service Categories: Security Operations Center

VigilantAI > Services > Security Operations Center

Service Categories: Security Operations Center

Yara Integrity monitoring
  • gurushyam.mony
  • September 14, 2022
  • No Comments

Network Intrusion & Detection

Recent Posts

  • APT28 Targeted European Entities Using Webhook-Based Macro Malware
  • Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb
  • ⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More
  • How Exposed Endpoints Increase Risk Across LLM Infrastructure
  • Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens

Recent Comments

No comments to show.

Explore Categories

  • Blog 2,415

Recent Posts

img

APT28 Targeted European Entities Using Webhook-Based

February 23, 2026
img

Wormable XMRig Campaign Uses BYOVD Exploit

February 23, 2026
img

⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy

February 23, 2026
img

How Exposed Endpoints Increase Risk Across

February 23, 2026

RSS Cyber Security

  • New Phishing Kit Starkiller Defeats Multi-Factor Authentication February 23, 2026
    Abnormal has discovered a new phishing kit that allows bad actors to steal usernames and passwords with a toolkit that spoofs live login pages and bypasses multi-factor authentication (MFA) protections.  Most phishing kits depend on static HTML clones of login pages, which, while effective, are inherently fragile. Even a small interface update from the brand being impersonated […]
    Kirsten Doyle
  • Why AI Adoption Has Become the Greatest Security Challenge of Our Time February 23, 2026
    Companies are investing in artificial intelligence at an unprecedented pace. Few areas of business remain untouched by automation, generation, or analysis through AI, yet what’s often missing from the conversation is how quickly this shift is redefining the threat landscape for modern organizations. Rapid innovation is increasingly turning into a security challenge, and the race […]
    John Mutuski
  • CISA Warns of Critical Security Vulnerability in Honeywell Cameras February 20, 2026
    CISA has warned that a critical security vulnerability (CVE-2026-1670) has been identified in four Honeywell CCTV camera models.  “Successful exploitation of this vulnerability could lead to account takeovers and unauthorized access to camera feeds; an unauthenticated attacker may change the recovery email address, potentially leading to further network compromise,” the advisory said.  The flaw is classified as “missing authentication for […]
    Kirsten Doyle
  • ESET Discovers First Android Malware to Abuse Generative AI for Dynamic UI Manipulation February 20, 2026
    Security researchers at ESET have uncovered what they describe as the first known case of Android malware abusing generative AI to manipulate a device’s user interface in real time.  Dubbed PromptSpy, the newly identified malware family uses Google’s Gemini to analyze on-screen content and dynamically guide malicious actions. While machine learning has previously been used in Android threats (including a recent […]
    Kirsten Doyle
  • Who Can You Trust? February 19, 2026
    Scammers, confidence men, swindlers. Whatever you call them, for all of human history, people have made a living cheating others out of their hard-earned possessions. While that’s never going to change, their tactics, however, always will. In Q4 2025, email scammers doubled down on a strategy that has worked for millennia: exploiting trust. These tricksters […]
    Rene Santiago
  • APIs Under Siege: Wallarm Report Reveals How AI Is Supercharging Modern Cyberattacks February 18, 2026
    APIs made up 17% of 67,058 published vulnerabilities in 2025, a total of 11,053 API-related flaws. The overlap between APIs and AI is even more notable. More than a third (36%) of AI vulnerabilities (786 out of 2,185) were API-related.  Of the 245 vulnerabilities identified in the U.S. Cybersecurity and Infrastructure Security Agency’s 2025 Known Exploited Vulnerabilities […]
    Kirsten Doyle
  • Eurail User Records Up for Sale on the Dark Web February 18, 2026
    Eurail BV has confirmed that some customer data impacted by the previously reported security incident has been offered for sale on the dark web and a sample data set has been posted on Telegram.   The company said it is continuing to investigate the scope and impact.  Last month, the company revealed that it had experienced a data breach when bad actors […]
    Kirsten Doyle
  • Group IB Report: Attackers Are Industrializing Supply Chain Compromise February 17, 2026
    Modern supply chain attacks are no longer isolated events. Rather, phishing, identity theft, malicious extensions, data breaches, ransomware, and extortion are becoming more and more interrelated steps of a single attack chain, where each step reinforces the next.  This was one of the findings of Group IB’s High-Tech Crime Trends Report 2026, based on Intelligence drawn from Group-IB’s Digital Crime Resistance Centers (DCRCs) […]
    Kirsten Doyle
  • Picus Red Report 2026: Attackers Choose “Silent Residency” Over Destruction February 17, 2026
    A recent report from Picus Labs, has uncovered a chilling evolution in cyber warfare, that it calls “the rise of the Digital Parasite.”   The report analyzed more than 1.1 million malicious files and 15.5 million actions last year, and revealed that bad actors have shifted 80% of their resources toward stealth, evasion, and persistence.  The report highlighted distinct, highly sophisticated behaviors that allow malware to inhabit systems for months without […]
    Kirsten Doyle
  • Dutch Telecoms Company Odido Discloses Breach Affecting Approximately 6.2 Million Customers February 16, 2026
    Dutch telecoms business Odido has disclosed a cyberattack on its customer contact system that happened on 7 February.   The personal information of approximately 6.2 million customers was disclosed, including names, residential addresses, mobile phone numbers, email addresses, account numbers, and ID information such as passports and driver’s licenses.   In a statement, the company said no passwords, call details or billing information are involved.  “We deeply regret this incident […]
    Kirsten Doyle

[email protected]

Maybrook Court, Glen Allen
VA, United States

Quick Links

  • About Us
  • Terms & Conditions
  • Privacy Policy
  • Contact Us

Our Services

  • Data Centers & Digital Assets Risk Management
  • Environmental Threat Exposure Management
  • CIS & Risk Assessments
  • Proactive AI Threat Hunting For Safety

Copyright ©2024 Qassurance Technology Inc