This post defines the strategic, operational and tactical levels of cyber threat intelligence, who uses it and how it protects organizations and users.
Malware Analysis is performed to discover hidden attackers actively working to exploit an organization’s network, identify latent infections, and analyze the captured payload.
Malware analysis may be used by threat intelligence professionals or cyber defenders to identify Indicators of Compromise (IOCs) and malicious threats specific to an organization’s environment. This can be done proactively to assist an organization with developing appropriate incident response plans prior to being attacked. This may also be done during or after an attack to identify the scope of an incident, and receive guidance on follow up actions for the containment and remediation phases.
Emotet: An In-Depth Document Analysis, is zvelo’s latest threat report intended to help defenders understand Emotet’s initial infection mechanisms so they may better protect their organizations.