zvelo Webinar | November 3, 2021 12:00 pm MDT 2021 Malicious Trends: Understanding the Impact and Implications Join zvelo’s Head of Cybersecurity, Brad Rhodes, for an online presentation of 2021 Malicious Trends: Understanding the Impact and Implications. Based on the data presented in the zveloCTI 2021 Malicious Trends Report, this webinar will focus on several…
zvelo is excited to announce the release of this year’s Annual Cyber Threat Intelligence Report on 2021 Malicious Trends.
SASE covers a broad range of network and security functions which are supported and enhanced by zvelo’s threat intelligence data.
See how zveloCTI aligns with the Pyramid of Pain IOCs to help assess the level of difficulty for tracking down an MCA within your environment.
zvelo Releases Malicious Detailed Detection Feed with Rich Metadata and IOCs for Blocking and Threat Research on Malicious URLs and Files.
Head of Cybersecurity, Brad Rhodes, tapped to lead Cyber Shield 2021, the Department of Defense’s largest unclassified cyber defense exercise.
zvelo takes you behind the scenes of a phishing attack to show you the TTPs attackers use to gain network access and establish persistence. There is far more than meets the eye.
Weaponizing Excel 4.0 Macros (XLM) is an easy, reliable method attackers use to gain entry into a target network and establish persistence.
This article discusses Symbolic Link (SYLK) files and how the old method of data exchange is now being used to gain entry to organizations.
This is the first article of a three-part series where we examine phishing attacks that faded from popularity but are now resurging — in particular, malicious Office documents.