Veroot Cyber Team

Banking Impersonation

Warning: Banking Impersonation Scams Targeting Corporate Executives

In recent times, an elusive group of scammers has emerged, adopting a sophisticated strategy to impersonate banking personnel, preying on both...

Read More

Russian Hacker Group ‘Star Blizzard’ Upgrades Phishing Stealth, Research Uncovers

State Sponsored Villains “Star Blizzard” (aka Seaborgium, BlueCharlie, Callisto Group, Coldriver) has been actively involved in cyber espionage since...

Read More
cyber phishing

Russian Military Hacker Group Target NATO Allies

Ukraine’s Computer Emergency Response Team (CERT) has issued a warning about a new phishing campaign orchestrated by Russia-linked hackers,...

Read More
cyber hacker

SEC Slaps Morgan Stanley with $35M Fine for Selling Unwiped and Unencrypted Hard Drives on Auction Sites

Morgan Stanley has agreed to pay a $35 million penalty to the Securities and Exchange Commission (SEC) for data security breaches. These breaches...

Read More
email spoofing example

Common Email Spoofing Attempts

Phishing and Spoofing are two of the most prevalent types of cyber-attacks used by malicious actors against businesses and organizations today.

Read More
cyber security model

Why is EDR Important?

EDR is important for IACs as it helps them detect and prevent cyber threats from endpoints. With EDR, IACs can quickly identify anomalies, such as...

Read More
LockBit Cyber Security

LockBit on the Prowl of Industry Titans

In a striking incident that caught the attention of IAC companies, the renowned Russia-linked ransom gang LockBit has launched an audacious attack on...

Read More
huntress guide

The Ultimate Guide to Huntress EDR and Veroot Partnership for IT Providers

Veroot is a proud partner with Huntress EDR! We have complete confidence in their ability to diligently monitor our systems and collaborate with us...

Read More


Anti-Virus (AV): Antivirus software, or AV, is a tool that finds and removes malware from devices. It looks for known viruses, worms, Trojans,...

Read More
up close keyboard

Millions of Exim Mail Servers Exposed to Zero-Day RCE Attacks

A critical security issue has been found in all versions of Exim mail transfer agent (MTA) software. This vulnerability could allow unauthorized...

Read More

Microsoft’s Crash Dump Results in Major Security Breach

According to a report by The Hacker News, Microsoft has revealed that a China-based threat actor known as Storm-0558 acquired an inactive consumer...

Read More