zvelo’s Cybersecurity Team shares how you can use Cyber Threat Intelligence (CTI) to successfully deliver actionable intelligence to support executive decision making which protects your Operating Environment (EO).
Cyber Threat Intelligence (CTI) is actionable Intelligence intended for Cybersecurity and Threat Intelligence teams to use for enrichment and analytics. zveloCTI supplies meticulously curated datasets for advanced Threat Intelligence which requires more visibility than identifying a URL as suspicious or bad. zveloCTI datasets deliver high veracity and accuracy while maintaining low false positive (FP) rates. Datasets include Suspicious Domain Intelligence, Malicious Intelligence, Phishing Intelligence, and More.
From a threat intelligence perspective, this post presents the Tactic, Technique and Procedure (TTP), which can be best described as Living Off The Land at Scale (LOTLS).
Phishing threats are not homogeneous in nature. Malicious actors use several different phishing attack topologies to execute their campaigns – each of which require a different approach to detect and mitigate the threat.
WordPress is an easy target and attackers are compromising vulnerable and misconfigured deployments to serve Qakbot and other malware.
This post demonstrates the lifecycle of a website and how it moves through zvelo’s InActiveWeb, ProActiveWeb and ActiveWeb.
zvelo is expanding threat detection capabilities to explore suspicious activity outside the ActiveWeb to include what we call the ProActiveWeb.
This presentation shares zvelo’s proactive research around suspicious Coronavirus domain behavior and details top observed trends showing specific examples.
Podcast: This episode covers a range of cybersecurity topics around cyber warfare including API security, phishing, the coronavirus threat landscape, and more.
The size and magnitude of the Malware and Ad-fraud bot problem is immense and growing. And, as bots continue to proliferate, there’s important distinctions to point out between Malware bots and Ad-fraud bots.