zvelo Releases Malicious Detailed Detection Feed™
zvelo Releases Malicious Detailed Detection Feed with Rich Metadata and IOCs for Blocking and Threat Research on Malicious URLs and Files.
Malicious threat detection is a critical capability for service providers, businesses and network security vendors allowing real-time identification of URLs and IPs associated with viruses, malware, and other threats with potential to harm to your system.
zvelo Releases Malicious Detailed Detection Feed with Rich Metadata and IOCs for Blocking and Threat Research on Malicious URLs and Files.
zvelo takes you behind the scenes of a phishing attack to show you the TTPs attackers use to gain network access and establish persistence. There is far more than meets the eye.
Weaponizing Excel 4.0 Macros (XLM) is an easy, reliable method attackers use to gain entry into a target network and establish persistence.
This article discusses Symbolic Link (SYLK) files and how the old method of data exchange is now being used to gain entry to organizations.
This is the first article of a three-part series where we examine phishing attacks that faded from popularity but are now resurging — in particular, malicious Office documents.
Malware Analysis uncovers hidden attackers actively exploiting your network, identifies latent infections and analyzes captured payloads.
Reduce your cyber threat risk by leveraging a Brand Vulnerability Assessment to identify the vulnerabilities and weaknesses which leave your brand exposed to attacks.
This post defines the strategic, operational and tactical levels of cyber threat intelligence, who uses it and how it protects organizations and users.
Emotet: An In-Depth Document Analysis, is zvelo’s latest threat report intended to help defenders understand Emotet’s initial infection mechanisms so they may better protect their organizations.
Rife with vulnerabilities that are actively probed by MCAs, connected consumer-grade equipment is poised to be the next attack surface.