research

Revisiting Battery Safety
In the wake of the recent pager attacks, we have received numerous questions from friends and customers about the risks of batteries in supply chain attacks. It should go without saying that ...

CVE-2024-38213: From Crumbs to Full Compromise in a Stealthy Cyber Attack
Threat actors are becoming increasingly creative, using vulnerabilities to infiltrate organizations in ways that might not immediately raise alarms. Veriti’s research team recently discovered a targeted email campaign utilizing CVE-2024-38213, cleverly disguised ...

Securing the Core: Why Operating System Hardening is Vital for Cybersecurity
In recent research, Veriti has uncovered a range of advanced tactics cybercriminals are using to exploit operating systems, taking advantage of built-in functionalities to conduct malicious activities undetected. Operating System (OS) hardening, ...

How OSINT Can Help Identify Employment Fraud
Nisos How OSINT Can Help Identify Employment Fraud Employment fraud poses a significant risk to companies that depend heavily on a remote workforce... The post How OSINT Can Help Identify Employment Fraud ...
Shielded on All Sides: Combining Manual PII Removal and Vulnerability Monitoring to Enhance Executive Protection
Nisos Shielded on All Sides: Combining Manual PII Removal and Vulnerability Monitoring to Enhance Executive Protection The availability of sensitive personal data through breaches and its continual sale online exposes individuals—and by ...

Exploiting Hurricane Helene with FEMA Scams and Phishing Threats
Natural disasters often bring out the best in people, with communities and organizations coming together to help those in need. Unfortunately, they also present opportunities for cybercriminals looking to exploit the chaos ...

Gamifying Extremism: The Identitarian Movement Gets Another Video Game
Nisos Gamifying Extremism: The Identitarian Movement Gets Another Video Game Nisos researchers examined The Great Rebellion, a video game available on popular gaming download platforms that pushes extremist, racist, and hateful pan-European ...

How Malware is Evolving: Sandbox Evasion and Brand Impersonation
Attackers are constantly seeking new methods to evade detection by antivirus, endpoint detection and response (EDR) tools, and sandbox environments. Malware creators are now using a combination of brand impersonation and sandbox ...

DLL Hijacking: How FormBook Malware Uses Safe DLL Search Mode to Persist on Endpoints
In the ongoing battle against cyber threats, attackers are constantly finding new ways to exploit vulnerabilities. Recently, Veriti’s research team detected a new FormBook malware campaign that leverages Safe DLL Search Mode ...

Diddy Do It? Or Did Cybercriminals? How Hackers Are Turning Scandals Into Cyber Attacks
Attackers often capitalize on public interest in high-profile scandals to spread malware and exploit users’ curiosity. The recent Sean “Diddy” Combs scandal is no exception. As public attention skyrockets around the story, ...