The Role of AI in Social Engineering
From chatbots mimicking humans to voice synthesis and deepfakes that disorient and deceive, learn about AI’s role in Social Engineering.
zvelo’s Phishing Detection systems leverage human-supervised machine learning and crowd-sourced continuous ActiveWeb monitoring in order to identify and track millions of active phishing URLs. Stay up to date and protect your networks and users with the latest targeted and “Zero-Minute” phishing URLs and campaigns.
From chatbots mimicking humans to voice synthesis and deepfakes that disorient and deceive, learn about AI’s role in Social Engineering.
Modern cyber risk management requires understanding ransomware. This post covers the basics from infiltration to extortion, as well as prevention and protection.
Phishing as a Service is a pervasive threat that has transformed phishing tools into commercial products made easily accessible to the masses.
Part 2 in the series, this post addresses the most common misconceptions that can skew or misrepresent the results of a threat feed evaluation.
Part 1 in a series on how to evaluate threat feeds, this post focuses on the key areas to measure to help guide your decision making process.
Attackers have been quick to weaponize IPFS, expanding the threat landscape. Here’s what you need to know about recent IPFS phishing attacks.
Discover the anatomy of phishing attacks, from social engineering to BEC, and learn how to defend your organization with the most effective phishing detection tools.
Amid Cyren’s liquidation announcement, zvelo stands ready to provide a superior solution with minimal disruption to vendors and their users.
Threat Advisory: Attackers are using file-sharing services like Smash or WeTransfer to deliver Bumblebee malware disguised as RFPs.
This blog post offers social engineering countermeasures and provides guidance to minimize the risk of falling victim to these attacks.