This article discusses Symbolic Link (SYLK) files and how the old method of data exchange is now being used to gain entry to organizations.
Cyber Threat Intelligence (CTI) is actionable Intelligence data pertaining to an organization’s information systems, networks, or digital assets that is intended to inform Cybersecurity and Threat Intelligence teams about potential risks and existing or emerging threats. As cybercriminals continue to grow more sophisticated in their attack tactics, gathering and leveraging cyber threat intelligence is a critical element to protecting your infrastructure and assets against cyber attacks and building a proactive, rather than reactive, cyber defense strategy.
This is the first article of a three-part series where we examine phishing attacks that faded from popularity but are now resurging — in particular, malicious Office documents.
During this 40 minute presentation, Brad Rhodes, Head of Cybersecurity at zvelo, discusses the Cyber Threat Intelligence (CTI) Process, explaining what it is, who uses it, how it’s used, use case scenarios and why it’s important to organizations both large and small.
For the average web surfer, the URL bar provides a magical portal to the interwebz where anything that can be thought of can be entered—revealing the treasures of the internet at the stroke of ‘enter’. For the rest of us, we know it gets much more complicated than that as we slip down the rabbit hole and into OSI, DNS, TLS, HTTPS, subdomains…
Malware Analysis uncovers hidden attackers actively exploiting your network, identifies latent infections and analyzes captured payloads.
Reduce your cyber threat risk by leveraging a Brand Vulnerability Assessment to identify the vulnerabilities and weaknesses which leave your brand exposed to attacks.
zvelo announces official release of PhishBlockList™ phishing threat intelligence feed leads the market for the fastest detection of active & emerging phishing threats.
This post defines the strategic, operational and tactical levels of cyber threat intelligence, who uses it and how it protects organizations and users.
Emotet: An In-Depth Document Analysis, is zvelo’s latest threat report intended to help defenders understand Emotet’s initial infection mechanisms so they may better protect their organizations.
Rife with vulnerabilities that are actively probed by MCAs, connected consumer-grade equipment is poised to be the next attack surface.