As the popularity of collectible cards continues to rise—whether it's Pokémon, NBA, NFL, or Star Wars—cyber attackers have found a new target: digital trading cards. Recently, Donald Trump announced his own digital trading card series, sparking excitement among...
Research
EXPOSED: OnlyFans Hack Gone Wrong – How Cyber Criminals Turn into Victims Overnight
In a twist of digital irony, the cyber underworld is facing an unexpected reckoning. Veriti's cyber research team has uncovered a sophisticated operation that's turning aspiring OnlyFans hackers into victims, demonstrating that in the ruthless domain of cybercrime,...
Streamers in the Crosshairs: How XWorm Malware Targets Online Content Creators
Content creators and streamers have carved out a unique niche, entertaining and educating millions of viewers. However, as their popularity rises, so does the attention they attract from cybercriminals. A new and unsettling trend is emerging: streamers are becoming...
Trump Campaign Crypto Scam: Unveiling the Phishing Plot
Uncovering a phishing scam targeting Trump’s supporters using crypto donations. Learn how to spot fraudulent sites and stay protected. Stay informed and vigilant.
Paris Olympics – Protect Yourself During Travel
As the Paris Olympics approaches, fans are excited about the event. Many have planned trips with pre-paid tickets, accommodations through Airbnb, pre-booked restaurants, and more. However, the question remains: how are we going to protect ourselves from hackers and...
Staying Safe During Amazon Prime Day
Every year, Amazon Prime Day brings with it not only great deals but also significant risks of fraud and cyber attacks. This year, Veriti's research team delved into various hacker forums to uncover the tactics and techniques used by scammers targeting this major...
RegreSSHion CVE-2024-6387: A Targeted Exploit in the Wild
A critical security flaw, known as regression and cataloged under CVE-2024-6387, has been identified in OpenSSH, just a few days ago. This vulnerability allows an unauthenticated attacker to execute arbitrary code and potentially obtain root access on the compromised...
ICQ: A Blast from the Past
After 28 years of service, ICQ, one of the pioneering instant messaging platforms, is finally shutting down its servers. This marks the end of an era for a tool that has witnessed the evolution of online communication since its launch in 1996. As we bid farewell to...
CVE-2024-24919 Exploitation, Veriti Proactive Remediation
Over the past few days, there has been a significant rise in exploitation attempts of the Check Point vulnerability identified as CVE-2024-24919. This increase is not isolated but part of a larger pattern of sophisticated cyber attacks that utilize both manual...
NEW PHISHING CAMPAIGN: TAKING THE BAIT
Phishing. For the past decade, phishing has remained a stalwart among attack vectors due to its alarming adaptability and effectiveness. The 2024 Data Breach Investigations Report (DBIR) from Verizon highlights a significant surge in phishing attacks that exploit both...











