zvelo’s Head of Cybersecurity Leads Cyber Shield 2021
Head of Cybersecurity, Brad Rhodes, tapped to lead Cyber Shield 2021, the Department of Defense’s largest unclassified cyber defense exercise.
DetailsHead of Cybersecurity, Brad Rhodes, tapped to lead Cyber Shield 2021, the Department of Defense’s largest unclassified cyber defense exercise.
Detailszvelo takes you behind the scenes of a phishing attack to show you the TTPs attackers use to gain network access and establish persistence. There is far more than meets the eye.
DetailsWeaponizing Excel 4.0 Macros (XLM) is an easy, reliable method attackers use to gain entry into a target network and establish persistence.
DetailsThis article discusses Symbolic Link (SYLK) files and how the old method of data exchange is now being used to gain entry to organizations.
DetailsThis is the first article of a three-part series where we examine phishing attacks that faded from popularity but are now resurging — in particular, malicious Office documents.
DetailsDuring this 40 minute presentation, Brad Rhodes, Head of Cybersecurity at zvelo, discusses the Cyber Threat Intelligence (CTI) Process, explaining what it is, who uses it, how it’s used, use case scenarios and why it’s important to organizations both large and small.
DetailsFor the average web surfer, the URL bar provides a magical portal to the interwebz where anything that can be thought of can be entered—revealing the treasures of the internet at the stroke of ‘enter’. For the rest of us, we know it gets much more complicated than that as we slip down the rabbit hole and into OSI, DNS, TLS, HTTPS, subdomains…
DetailsMalware Analysis uncovers hidden attackers actively exploiting your network, identifies latent infections and analyzes captured payloads.
DetailsReduce your cyber threat risk by leveraging a Brand Vulnerability Assessment to identify the vulnerabilities and weaknesses which leave your brand exposed to attacks.
Detailszvelo Launches Cybersecurity Professional Services for Malware Analysis, External Threat Hunting, Brand Vulnerability Assessments, and More.
Details