Threat Feed Evaluations: Key Areas for Consideration
Part 1 in a series on how to evaluate threat feeds, this post focuses on the key areas to measure to help guide your decision making process.
Indicators of compromise (IOCs) are the pieces of evidence collected from a host system (e.g. laptops, servers, mobile phones), applications (e.g. databases), cloud-based capabilities or network when suspicious or malicious activities have been identified.
zvelo’s curated cyber threat intelligence data delivers rich metadata for highly contextualized malicious and phishing Indicators of Compromise and threat signals which can be easily integrated into existing security tools and platforms (including SIEM, SOAR, EDR, MDR, XDR, etc.), for deeper analysis and enrichment by cyber defenders and threat analysts.
Common Indicators of Compromise (listed in order from the easiest to assess to the most difficult) include file hashes, IP addresses, domain names, network/host artifacts, tools, and tactics, techniques, and procedures (TTPs). zvelo details how its threat detection feeds map to each of these IOCs within the Pyramid of Pain — a model cyber defenders use for Incident Response (IR) and threat hunting.
Part 1 in a series on how to evaluate threat feeds, this post focuses on the key areas to measure to help guide your decision making process.
A comprehensive overview of cyber threat intelligence: What it is, how it’s used, the process lifecycle, use cases, and evaluation guidelines.
The latest string of attacks using Qakbot malware are breaching networks and successfully deploying ransomware in less than half a day.
Active Threat Alert: Protect against active phishing campaigns serving up personalized and uniquely randomized URL paths or subdomains.
Threat Alert: zvelo’s PhishBlocklist identifies a very active USPS phishing attack using personalized URLs that target USPS customers.
zvelo announced predictive phishing detection enhancements that will help cyber defenders to predict and block phishing campaigns.
zvelo’s attacking IP detections can be used to fend off Brute Force attacks launched against commonly attacked ports like SSH and FTP.
Understand the danger of misconfigured and publicly exposed assets by using honeypots to bait adversaries and expose your attack surface.
A Global Cobalt Strike activity trend analysis over Q1 of 2022 offers situational awareness into one of the most prevalent attack frameworks.
Zvelo Unveils New Features and Capabilities in its Malicious Threat Detection and Global Cyber Threat Intelligence