This article discusses Symbolic Link (SYLK) files and how the old method of data exchange is now being used to gain entry to organizations.
Cyber Threat Intelligence (CTI) is actionable Threat Intelligence intended for Cybersecurity and Threat Intelligence teams to use for enrichment and analytics.
zveloCTI supplies meticulously curated datasets for advanced Threat Intelligence which requires more visibility than identifying a URL as suspicious or bad. zveloCTI datasets deliver high veracity and accuracy while maintaining low false positive (FP) rates. Datasets include:
- Suspicious Domain Intelligence
- Malicious Intelligence
- Phishing Intelligence
This is the first article of a three-part series where we examine phishing attacks that faded from popularity but are now resurging — in particular, malicious Office documents.
During this 40 minute presentation, Brad Rhodes, Head of Cybersecurity at zvelo, discusses the Cyber Threat Intelligence (CTI) Process, explaining what it is, who uses it, how it’s used, use case scenarios and why it’s important to organizations both large and small.
Malware Analysis uncovers hidden attackers actively exploiting your network, identifies latent infections and analyzes captured payloads.
Reduce your cyber threat risk by leveraging a Brand Vulnerability Assessment to identify the vulnerabilities and weaknesses which leave your brand exposed to attacks.
This post defines the strategic, operational and tactical levels of cyber threat intelligence, who uses it and how it protects organizations and users.
Emotet: An In-Depth Document Analysis, is zvelo’s latest threat report intended to help defenders understand Emotet’s initial infection mechanisms so they may better protect their organizations.
Rife with vulnerabilities that are actively probed by MCAs, connected consumer-grade equipment is poised to be the next attack surface.
The intersection of infrastructure and influence creates linkages which may become discoverable and aid cyber defenders in catching MCAs.
zvelo’s Response to the SolarWinds Attack Protected its Clients and Partner Network of 600+ Million End Points and Users Across the Globe. Learn more.