zvelo takes you behind the scenes of a phishing attack to show you the TTPs attackers use to gain network access and establish persistence. There is far more than meets the eye.
Cyber Threat Intelligence (CTI) is actionable Intelligence intended for Cybersecurity and Threat Intelligence teams to use for enrichment and analytics. zveloCTI supplies meticulously curated datasets for advanced Threat Intelligence which requires more visibility than identifying a URL as suspicious or bad. zveloCTI datasets deliver high veracity and accuracy while maintaining low false positive (FP) rates. Datasets include Suspicious Domain Intelligence, Malicious Intelligence, Phishing Intelligence, and More.
Weaponizing Excel 4.0 Macros (XLM) is an easy, reliable method attackers use to gain entry into a target network and establish persistence.
This article discusses Symbolic Link (SYLK) files and how the old method of data exchange is now being used to gain entry to organizations.
This is the first article of a three-part series where we examine phishing attacks that faded from popularity but are now resurging — in particular, malicious Office documents.
During this 40 minute presentation, Brad Rhodes, Head of Cybersecurity at zvelo, discusses the Cyber Threat Intelligence (CTI) Process, explaining what it is, who uses it, how it’s used, use case scenarios and why it’s important to organizations both large and small.
For the average web surfer, the URL bar provides a magical portal to the interwebz where anything that can be thought of can be entered—revealing the treasures of the internet at the stroke of ‘enter’. For the rest of us, we know it gets much more complicated than that as we slip down the rabbit hole and into OSI, DNS, TLS, HTTPS, subdomains…
Malware Analysis uncovers hidden attackers actively exploiting your network, identifies latent infections and analyzes captured payloads.
Reduce your cyber threat risk by leveraging a Brand Vulnerability Assessment to identify the vulnerabilities and weaknesses which leave your brand exposed to attacks.
zvelo announces official release of PhishBlockList™ phishing threat intelligence feed leads the market for the fastest detection of active & emerging phishing threats.Details
This post defines the strategic, operational and tactical levels of cyber threat intelligence, who uses it and how it protects organizations and users.