This post unpacks the criminal elements in the ransomware ecosystem: from developers and distributors to negotiators and even PR specialists.
Advanced threat and exploit detection is critical to cybersecurity and network defense. zvelo’s Malicious Detection capabilities empower MSSPs, ISPs, TELCOs, network security providers, and VARs to provide world-class protection. Gain advanced insight with the most accurate URL database for malicious exploit detection to better understand the cyber threat landscape. Categories include Command and Control, Malware, Spyware, Spam URLs, Cryptocurrency Mining, Phishing and Fraud, and more. Read more about malicious detection.
Part 2 in the series, this post addresses the most common misconceptions that can skew or misrepresent the results of a threat feed evaluation.
Part 1 in a series on how to evaluate threat feeds, this post focuses on the key areas to measure to help guide your decision making process.
Today’s threat actors are masters of evasion, constantly developing new versions of malware to outmaneuver cyber defenders and forging new paths to expand the threat landscape. As global cybercrime continues to escalate and plague both organizations and individuals, becoming the target of a cyber attack at one point or another is no longer a question…
Amid Cyren’s liquidation announcement, zvelo stands ready to provide a superior solution with minimal disruption to vendors and their users.
Threat Advisory: Attackers are using file-sharing services like Smash or WeTransfer to deliver Bumblebee malware disguised as RFPs.
A curated threat intelligence approach, in which aging data is managed based on current attack status, is crucial to preventing cybercrime.
The latest string of attacks using Qakbot malware are breaching networks and successfully deploying ransomware in less than half a day.
Attackers are turning up the heat with advanced TTPs like Adversary-in-the-Middle (AiTM) phishing attacks to steal session cookies and bypass MFA security.