A newly discovered 0-click NTLM authentication bypass vulnerability has resurfaced within Microsoft Telnet Server implementations, exposing a dangerous flaw in outdated yet still-operational systems. Veriti research reveals that this vulnerability, requiring no user...
Research
How Deepfakes Resurrect the Nigerian Prince Scam
By Veriti Research, April 24th The infamous "Nigerian prince" scam, once a laughable email trope, has taken on a far more dangerous form in the era of Generative AI (GenAI). Veriti Research has uncovered a new campaign that demonstrates just how sophisticated...
Trump vs. Biden Cyber Strategy — According to AI
We asked an AI agent to analyze the latest shift in U.S. cybersecurity policy, comparing past strategies under Biden to the new 2025 Trump Executive Order. The result? A surprisingly structured analysis that maps out the core philosophical and operational differences,...
Tax Season Threat Surge
Veriti Research has identified a significant rise in tax-related malware samples across multiple platforms. The research team discovered malware samples targeting Android, Linux, and Windows, all connected to the same adversary operating from a single IP...
Genetic Breach Fallout: 23andMe’s Collapse Raises Security Alarms
In 2023, a massive data breach at 23andMe shook the foundation of the consumer genomics industry. Fast forward to today, the company has filed for bankruptcy. From Veriti’s perspective, this incident highlights the devastating consequences of failing to secure deeply...
Inside Daisy Cloud: 30K Stolen Credentials Exposed
Veriti research recently analyzed stolen data that was published in a telegram group named “Daisy Cloud” (potentially associated with the RedLine Stealer), exposing the inner workings of a cybercrime marketplace. This group offers thousands of stolen credentials in an...
Snow White — Beware the Bad Apple in the Torrent
As the new Snow White movie arrives in theaters with lackluster audience attendance, the absence of streaming options on platforms like Disney+ has nudged many users to seek pirated versions online. From our perspective, this kind of consumer behavior isn’t new,...
The Top Cloud Vulnerabilities Threatening Organizations
The Veriti research team has analyzed the latest cloud vulnerabilities, revealing critical security risks, attack patterns, and real world exploitation cases. Our findings highlight the top vulnerability categories, the most exploited CVEs, and the actors...
CVE-2024-27564 Actively Exploited in the Wild
Attackers are actively targeting OpenAI, exploiting CVE-2024-27564, a Server-Side Request Forgery (SSRF) vulnerability in commit f9f4bbc. Veriti’s latest research reveals that this vulnerability, despite being classified as medium severity, has already been weaponized...
Veriti Research Uncovers Malware Exploiting Cloud Services
Veriti Research has identified a growing trend - attackers leveraging cloud infrastructure to facilitate malware distribution and command-and-control (C2) operations. This evolving tactic not only makes detection more challenging but also exposes organizations to...











