zvelo Releases Predictive Phishing Detection
zvelo announced predictive phishing detection enhancements that will help cyber defenders to predict and block phishing campaigns.
Indicators of compromise (IOCs) are the pieces of evidence collected from a host system (e.g. laptops, servers, mobile phones), applications (e.g. databases), cloud-based capabilities or network when suspicious or malicious activities have been identified.
zvelo’s curated cyber threat intelligence data delivers rich metadata for highly contextualized malicious and phishing Indicators of Compromise and threat signals which can be easily integrated into existing security tools and platforms (including SIEM, SOAR, EDR, MDR, XDR, etc.), for deeper analysis and enrichment by cyber defenders and threat analysts.
Common Indicators of Compromise (listed in order from the easiest to assess to the most difficult) include file hashes, IP addresses, domain names, network/host artifacts, tools, and tactics, techniques, and procedures (TTPs). zvelo details how its threat detection feeds map to each of these IOCs within the Pyramid of Pain — a model cyber defenders use for Incident Response (IR) and threat hunting.
zvelo announced predictive phishing detection enhancements that will help cyber defenders to predict and block phishing campaigns.
zvelo’s attacking IP detections can be used to fend off Brute Force attacks launched against commonly attacked ports like SSH and FTP.
Understand the danger of misconfigured and publicly exposed assets by using honeypots to bait adversaries and expose your attack surface.
A Global Cobalt Strike activity trend analysis over Q1 of 2022 offers situational awareness into one of the most prevalent attack frameworks.
Zvelo Unveils New Features and Capabilities in its Malicious Threat Detection and Global Cyber Threat Intelligence
SysJoker Threat Alert: zvelo protects clients against SysJoker, a cross-platform backdoor malware attack targeting Linux, Mac, and Windows.
Commonly used by eCrime groups like Wizard Spider, the return of Emotet foreshadows a potential surge in ransomware attacks.
Threat Update: The Log4j vulnerability continues to be actively exploited. Immediate action to update and monitor potentially impacted systems is advised.
Threat Alert: The Log4j vulnerability has quickly been weaponized and is being used to exploit exposed systems. Here’s what you should know.
Understanding how malicious and phishing threat data gets curated is crucial to assessing the value of curated cyber threat intelligence.