The leaked internal chat communications of the Black Basta ransomware group offer an unprecedented view into how cybercriminals operate, plan attacks, and evade detection. The Veriti Research team analyzed these chat logs, revealing our favorite exploits,...
Research
Are False Positives Killing Your Cloud Security? Veriti Research Reveals
Veriti’s latest research identifies key false positive triggers in cloud environments, their underlying causes, and their impact on businesses. By understanding these issues, security teams can refine their defenses and reduce unnecessary alerts without compromising...
Indicators of Compromise in the Cloud: Where the Attacks Are Coming From
Veriti research has found that over 25% of organizations allow bi-directional connectivity to and from the cloud without additional security inspection - a critical misstep that exposes businesses to cyber threats. Attackers are leveraging the cloud as a launchpad for...
Inside Amazon GuardDuty: What the Logs Reveal About Cloud Security
Amazon GuardDuty is often referred to as the security hub of Amazon’s cloud ecosystem. It provides advanced threat detection by analyzing run-time (OS-level) activities, network traffic logs, and security events. Amazon describes it as "a single runtime monitoring...
CVE-2025-0108: Active Exploits Targeting Palo Alto PAN-OS – What You Need to Know
In recent days, Veriti Research has observed multiple attack attempts exploiting CVE-2025-0108, a critical authentication bypass vulnerability affecting Palo Alto PAN-OS. This vulnerability is actively being leveraged in the wild, highlighting the immediate need for...
The Hidden Risks of Cloud Misconfigurations & How Veriti Fixes Them
Cloud adoption has skyrocketed, but with it comes a significant challenge: misconfigurations. These security gaps make cloud environments vulnerable to data breaches, unauthorized access, malware infections, and compliance violations. Most security teams...
Hackers Hijack JFK File Release: Malware & Phishing Surge
Veriti Research has uncovered a potentially growing cyber threat campaign surrounding the release of the declassified JFK, RFK, and MLK files. Attackers are capitalizing on public interest in these historical documents to launch potential malware campaigns, phishing...
Trump’s Digital Footprint: Unveiling Malicious Campaigns Amid Political Milestones
As the political landscape heats up, so does the activity in the cyber threat domain. High-profile events such as inaugurations often become a prime opportunity for cybercriminals to launch malicious campaigns. With Trump’s upcoming inauguration on January 20th, our...
Christmas is Coming: The Perfect X-Mas Gift for Hackers
As the holiday season rolls around, the spirit of giving extends beyond just family and friends. Cybercriminals, too, indulge in their version of “gift-giving,” offering malicious tools and exploiting festive trends to amplify their attacks. In Part 3 of our Christmas...
Christmas is Coming: ‘Tis The Season
The festive season brings joy, celebrations, and, unfortunately, cyber threats cleverly disguised under the veil of holiday cheer. In Part 2 of our blog series, we shine a light on the hidden dangers lurking in digital spaces, from malware disguised as innocent elves...











