This post unpacks the criminal elements in the ransomware ecosystem: from developers and distributors to negotiators and even PR specialists.
Malware is malicious code developed by cyberattackers, designed to cause extensive damage to data and systems or to gain unauthorized access to a network. zvelo blocks malicious threats and exploits which can be detected at the domain, full-path, or page-level.
AI has undoubtedly benefited threat actors, but how close are we to a world where AI-powered malware can autonomously invade a network?
Today’s threat actors are masters of evasion, constantly developing new versions of malware to outmaneuver cyber defenders and forging new paths to expand the threat landscape. As global cybercrime continues to escalate and plague both organizations and individuals, becoming the target of a cyber attack at one point or another is no longer a question…
This broad overview of cybercrime includes the main types of cybercrime, underlying motivations, societal impact, and tactics for prevention.
Threat Advisory: Attackers are using file-sharing services like Smash or WeTransfer to deliver Bumblebee malware disguised as RFPs.
This post illustrates how you can leverage the threat intel from honeypots to identify malicious payloads like CoinMiners to block cryptojacking attempts.
A Global Cobalt Strike activity trend analysis over Q1 of 2022 offers situational awareness into one of the most prevalent attack frameworks.
SysJoker Threat Alert: zvelo protects clients against SysJoker, a cross-platform backdoor malware attack targeting Linux, Mac, and Windows.
Emotet: An In-Depth Document Analysis, is zvelo’s latest threat report intended to help defenders understand Emotet’s initial infection mechanisms so they may better protect their organizations.
We’ve put together this glossary of cyber threat definitions as a resource for you in your quest to help make the internet a safer place for all!