CTI: Analysis, Dissemination, and Feedback
Completing the CTI Process Loop blog series, this post focuses on the last three stages of the CTI Loop: Analysis, Dissemination & Feedback.
Phishing is a “scam” and form of internet fraud, in which bad actors attempt to deceive internet users into unveiling sensitive personal information. In its original and most common form, the attack is initiated via an email purporting to be from a reputable or legitimate source. Inside the email, the attacker urges the victim to act in some way and includes (“hides”) a malicious link. When clicked, that link takes the victim to a fraudulent or compromised webpage. From there, the victim is prompted to enter sensitive personal information (i.e. username, email, password, credit card information, etc.). Phishing webpages can appear nearly identical to their authentic counterparts – often requiring advanced phishing detection solutions to identify the fake. Mobile phishing attacks that take advantage of simplified user interfaces and design choices intended to improve “usability” on smaller devices have become particularly effective.
zvelo’s phishing detection solution delivers maximum protection against active and emerging phishing threats in the wild. Advanced AI-based, proprietary technology detects unique phishing threats earlier and more accurately than other providers, to neutralize emerging threats when they are most dangerous.
Completing the CTI Process Loop blog series, this post focuses on the last three stages of the CTI Loop: Analysis, Dissemination & Feedback.
Learn about the CTI Collection and Processing stages of the feedback loop and how zvelo leverages each stage for Cyber Threat Intelligence.
Phishing threats are not homogeneous in nature. Malicious actors use several different phishing attack topologies to execute their campaigns – each of which require a different approach to detect and mitigate the threat.
Soaring profits and easy targets are driving cyber criminals to capitalize on the business of Ransomware-as-a-Service (RaaS).
The emerging cybercrime trend of diversifying attack targets demonstrates how criminals are increasingly able to detect and exploit new vulnerabilities.
When it comes to web mail alternatives for securing your email, here are a few “go-to” services combining rich user experiences and no-nonsense security.
The cost of a data breach goes well beyond remediation and recovery. Know your risks. Go below the surface layer to assess what’s actually at stake.
The adoption of single-use phishing URLs is driving new demand for zero-second detections to keep up with the dwindling lifespan of phishing sites.
The Anti-Phishing Working Group (APWG) released their quarterly Phishing Attack Trends Report for the first quarter of 2013. Payment Services were reported as the most phished industry sector, followed by Financial Services.
The 2011 Anti-Phishing Working Group (APWG) eCrime Researchers Summit, out of San Diego, California, moved fast with a number of interesting presentations and fascinating people. The APWG is a non-profit global pan-industrial and law enforcement association focused on eliminating the fraud, crime and identity theft that results from phishing, pharming, malware and e-mail spoofing of all types. The eCrime Researchers Summit brings together malware researchers, counter-eCrime developers and responders, and includes the 2011 Fall General Meeting. Here are some highlights from the event.