SASE covers a broad range of network and security functions which are supported and enhanced by zvelo’s threat intelligence data.
Cyber Threat Intelligence (CTI) is actionable Threat Intelligence intended for Cybersecurity and Threat Intelligence teams to use for enrichment and analytics.
zveloCTI supplies meticulously curated datasets for advanced Threat Intelligence which requires more visibility than identifying a URL as suspicious or bad. zveloCTI datasets deliver high veracity and accuracy while maintaining low false positive (FP) rates. Datasets include:
- Suspicious Domain Intelligence
- Malicious Intelligence
- Phishing Intelligence
See how zveloCTI aligns with the Pyramid of Pain IOCs to help assess the level of difficulty for tracking down an MCA within your environment.
zvelo Releases Malicious Detailed Detection Feed with Rich Metadata and IOCs for Blocking and Threat Research on Malicious URLs and Files.
Head of Cybersecurity, Brad Rhodes, tapped to lead Cyber Shield 2021, the Department of Defense’s largest unclassified cyber defense exercise.
zvelo takes you behind the scenes of a phishing attack to show you the TTPs attackers use to gain network access and establish persistence. There is far more than meets the eye.
Weaponizing Excel 4.0 Macros (XLM) is an easy, reliable method attackers use to gain entry into a target network and establish persistence.
This article discusses Symbolic Link (SYLK) files and how the old method of data exchange is now being used to gain entry to organizations.
This is the first article of a three-part series where we examine phishing attacks that faded from popularity but are now resurging — in particular, malicious Office documents.
During this 40 minute presentation, Brad Rhodes, Head of Cybersecurity at zvelo, discusses the Cyber Threat Intelligence (CTI) Process, explaining what it is, who uses it, how it’s used, use case scenarios and why it’s important to organizations both large and small.
Malware Analysis uncovers hidden attackers actively exploiting your network, identifies latent infections and analyzes captured payloads.