The holiday season is a time of joy, celebrations, and—unfortunately—a spike in cybersecurity threats. Cybercriminals often exploit the festive cheer, targeting individuals and organizations distracted by the season's busyness. This three-part blog series dives into...
Research
An IoC Carol: A Chorus of Chaos
IoC feeds have become a staple for cybersecurity teams, offering blacklists of IP addresses to block malicious activity. At first glance, they seem like a no-brainer: plug them in, block the bad actors, and you’re safe, right? Unfortunately, the reality isn’t so...
THE DOUBLE-EDGED SWORD OF AI IN CYBERSECURITY
Explore Veriti’s latest research on AI in cybersecurity—its transformative potential, emerging threats, and how proactive defense can mitigate AI-driven risks.
CVE-2024-38213: From Crumbs to Full Compromise in a Stealthy Cyber Attack
Threat actors are becoming increasingly creative, using vulnerabilities to infiltrate organizations in ways that might not immediately raise alarms. Veriti’s research team recently discovered a targeted email campaign utilizing CVE-2024-38213, cleverly disguised to...
Securing the Core: Why Operating System Hardening is Vital for Cybersecurity
In recent research, Veriti has uncovered a range of advanced tactics cybercriminals are using to exploit operating systems, taking advantage of built-in functionalities to conduct malicious activities undetected. Operating System (OS) hardening, configuring and...
Exploiting Hurricane Helene with FEMA Scams and Phishing Threats
Natural disasters often bring out the best in people, with communities and organizations coming together to help those in need. Unfortunately, they also present opportunities for cybercriminals looking to exploit the chaos for financial gain. With Hurricane Helene and...
How Malware is Evolving: Sandbox Evasion and Brand Impersonation
Attackers are constantly seeking new methods to evade detection by antivirus, endpoint detection and response (EDR) tools, and sandbox environments. Malware creators are now using a combination of brand impersonation and sandbox evasion techniques to bypass security...
DLL Hijacking: How FormBook Malware Uses Safe DLL Search Mode to Persist on Endpoints
In the ongoing battle against cyber threats, attackers are constantly finding new ways to exploit vulnerabilities. Recently, Veriti's research team detected a new FormBook malware campaign that leverages Safe DLL Search Mode to maintain persistence on infected...
Diddy Do It? Or Did Cybercriminals? How Hackers Are Turning Scandals Into Cyber Attacks
Attackers often capitalize on public interest in high-profile scandals to spread malware and exploit users’ curiosity. The recent Sean “Diddy” Combs scandal is no exception. As public attention skyrockets around the story, cybercriminals are seizing the opportunity to...
Unmasking Malware Through IP Tracking: How Attackers Exploit IP and Geo-Location Data to Target Your Network
Identifying and tracking the origin of an attack is critical for mitigating the damage caused by malware. One of the most effective methods to do so is by analyzing IP addresses, which can provide clues about when and where an attack first took place. In a recent...











