CTI: Analysis, Dissemination, and Feedback
Completing the CTI Process Loop blog series, this post focuses on the last three stages of the CTI Loop: Analysis, Dissemination & Feedback.
The threat landscape continues to evolve—individual and state-backed hackers and agencies become increasingly emboldened to compromise websites and servers, steal CPU cycles for cryptocurrency mining, embark on social engineering efforts to find backdoors, and sway public opinion through fake news and other measures. zvelo provides the most advanced URL/IP categorization database for web filtering, whitelists and blacklists, and residential and business protections against bad actors and malicious online behavior. Explore zvelo’s Cybersecurity and threat intelligence data feeds for industry leading malicious and phishing exploit detection and the most advanced cyber threat intelligence available to OEMs and device manufacturers.
Completing the CTI Process Loop blog series, this post focuses on the last three stages of the CTI Loop: Analysis, Dissemination & Feedback.
zvelo releases its first Cyber Threat Intelligence Malicious Trends Report for insights into current threats and exploits on the ActiveWeb.
zvelo’s Phishing Detection enhances Smishing protection to drive revenue and boost profitability for a global mobile messaging platform.
DetailsBeyond the malicious and phishing activities of the ActiveWeb, lurks suspicious activity with new domain registrations in the ProActiveWeb.
Learn about the CTI Collection and Processing stages of the feedback loop and how zvelo leverages each stage for Cyber Threat Intelligence.
Black Hat 2020, emphasizing an aim to undermine the legitimacy of the upcoming US elections, observations from zvelo’s Cybersecurity Team.
We’ve put together this glossary of cyber threat definitions as a resource for you in your quest to help make the internet a safer place for all!
Domain Generation Algorithms (DGAs) are a key tool for threat actors. As DGAs become more sophisticated and increasingly difficult to detect, zvelo’s Cybersecurity Team recommends heightened awareness and shares what you need to know.
zvelo’s Cybersecurity Team shares how you can use Cyber Threat Intelligence (CTI) to successfully deliver actionable intelligence to support executive decision making which protects your Operating Environment (EO).
From a threat intelligence perspective, this post presents the Tactic, Technique and Procedure (TTP), which can be best described as Living Off The Land at Scale (LOTLS).