A Global Cobalt Strike activity trend analysis over Q1 of 2022 offers situational awareness into one of the most prevalent attack frameworks.
Phishing is the fraudulent use of electronic communications to deceive users through spoofing, website forgery, redirectors or infected attachments.
2021 marked a record year for financial losses due to Business Email Compromise. What you need to know about BEC Attacks for 2022.
The intersection of infrastructure and influence creates linkages which may become discoverable and aid cyber defenders in catching MCAs.
Communication via SMS is globally ubiquitous and attackers increasingly leverage Smishing to distribute phishing links to bait their victims.
zvelo releases its first Cyber Threat Intelligence Malicious Trends Report for insights into current threats and exploits on the ActiveWeb.
We’ve put together this glossary of cyber threat definitions as a resource for you in your quest to help make the internet a safer place for all!
From a threat intelligence perspective, this post presents the Tactic, Technique and Procedure (TTP), which can be best described as Living Off The Land at Scale (LOTLS).
Phishing threats are not homogeneous in nature. Malicious actors use several different phishing attack topologies to execute their campaigns – each of which require a different approach to detect and mitigate the threat.
Lured by the growing success of SMS, MMS and RCS mobile marketing platforms, cyber criminals take advantage of user behavior to expand SMS threat landscape.
Phishing remains a top cyber threat. Sophisticated scams are very easy to execute and highly profitable. Here are the top phishing trends in 2020 to watch.