Baiting Attackers to Identify Malicious Payloads Like CoinMiners
This post illustrates how you can leverage the threat intel from honeypots to identify malicious payloads like CoinMiners to block cryptojacking attempts.
Malware is malicious code developed by cyberattackers, designed to cause extensive damage to data and systems or to gain unauthorized access to a network. zvelo blocks malicious threats and exploits which can be detected at the domain, full-path, or page-level.
This post illustrates how you can leverage the threat intel from honeypots to identify malicious payloads like CoinMiners to block cryptojacking attempts.
A Global Cobalt Strike activity trend analysis over Q1 of 2022 offers situational awareness into one of the most prevalent attack frameworks.
SysJoker Threat Alert: zvelo protects clients against SysJoker, a cross-platform backdoor malware attack targeting Linux, Mac, and Windows.
Emotet: An In-Depth Document Analysis, is zvelo’s latest threat report intended to help defenders understand Emotet’s initial infection mechanisms so they may better protect their organizations.
We’ve put together this glossary of cyber threat definitions as a resource for you in your quest to help make the internet a safer place for all!
Domain Generation Algorithms (DGAs) are a key tool for threat actors. As DGAs become more sophisticated and increasingly difficult to detect, zvelo’s Cybersecurity Team recommends heightened awareness and shares what you need to know.
WordPress is an easy target and attackers are compromising vulnerable and misconfigured deployments to serve Qakbot and other malware.
Malicious Cyber Actors increasingly exploit seemingly legitimate whitelisted sites to deliver malware, utilizing our own tools and trust against us.
The resurgence of the Emotet trojan reminds us of these 5 habits everyone should develop to maximize your organization’s online security.
Malicious Cryptocurrency Mining, or Cryptojacking, is the unauthorized use of a user’s device to mine cryptocurrencies. This article covers primary infection methods and tips for identification and prevention of cryptomining malware.