This post defines the strategic, operational and tactical levels of cyber threat intelligence, who uses it and how it protects organizations and users.
zvelo’s Phishing Detection systems leverage human-supervised machine learning and crowd-sourced continuous ActiveWeb monitoring in order to identify and track millions of active phishing URLs. Stay up to date and protect your networks and users with the latest targeted and “Zero-Minute” phishing URLs and campaigns.
The intersection of infrastructure and influence creates linkages which may become discoverable and aid cyber defenders in catching MCAs.
zvelo’s Response to the SolarWinds Attack Protected its Clients and Partner Network of 600+ Million End Points and Users Across the Globe. Learn more.
Communication via SMS is globally ubiquitous and attackers increasingly leverage Smishing to distribute phishing links to bait their victims.
Completing the CTI Process Loop blog series, this post focuses on the last three stages of the CTI Loop: Analysis, Dissemination & Feedback.
zvelo’s Phishing Detection enhances Smishing protection to drive revenue and boost profitability for a global mobile messaging platform.Details
Beyond the malicious and phishing activities of the ActiveWeb, lurks suspicious activity with new domain registrations in the ProActiveWeb.
zvelo’s meticulously curated datasets for Malicious URLs, Phishing URLs, and Web Content Categorizations, support new tiered service offering and drive revenue growth for a global Remote Browser Isolation provider.Details
zvelo’s Cybersecurity Team shares how you can use Cyber Threat Intelligence (CTI) to successfully deliver actionable intelligence to support executive decision making which protects your Operating Environment (EO).
From a threat intelligence perspective, this post presents the Tactic, Technique and Procedure (TTP), which can be best described as Living Off The Land at Scale (LOTLS).