zvelo Releases Malicious Trends Report
zvelo releases its first Cyber Threat Intelligence Malicious Trends Report for insights into current threats and exploits on the ActiveWeb.
Detailszvelo releases its first Cyber Threat Intelligence Malicious Trends Report for insights into current threats and exploits on the ActiveWeb.
DetailsBeyond the malicious and phishing activities of the ActiveWeb, lurks suspicious activity with new domain registrations in the ProActiveWeb.
DetailsLearn about the CTI Collection and Processing stages of the feedback loop and how zvelo leverages each stage for Cyber Threat Intelligence.
DetailsBlack Hat 2020, emphasizing an aim to undermine the legitimacy of the upcoming US elections, observations from zvelo’s Cybersecurity Team.
DetailsWe’ve put together this glossary of cyber threat definitions as a resource for you in your quest to help make the internet a safer place for all!
DetailsDomain Generation Algorithms (DGAs) are a key tool for threat actors. As DGAs become more sophisticated and increasingly difficult to detect, zvelo’s Cybersecurity Team recommends heightened awareness and shares what you need to know.
Detailszvelo’s Cybersecurity Team shares how you can use Cyber Threat Intelligence (CTI) to successfully deliver actionable intelligence to support executive decision making which protects your Operating Environment (EO).
DetailsFrom a threat intelligence perspective, this post presents the Tactic, Technique and Procedure (TTP), which can be best described as Living Off The Land at Scale (LOTLS).
DetailsPhishing threats are not homogeneous in nature. Malicious actors use several different phishing attack topologies to execute their campaigns – each of which require a different approach to detect and mitigate the threat.
DetailsDriven by the spike in remote access demand due to the global pandemic, organizations now face an urgent need to shift from legacy VPNs to Secure Web Gateways in order to support a modern, cloud-based architecture.
Details