Learn about the CTI Collection and Processing stages of the feedback loop and how zvelo leverages each stage for Cyber Threat Intelligence.
Threat intelligence is information and data which cybersecurity professionals use to prepare for, as well as to detect and protect organizations and end users from cyber attacks carried out by malicious threat actors.
Black Hat 2020, emphasizing an aim to undermine the legitimacy of the upcoming US elections, observations from zvelo’s Cybersecurity Team.
Domain Generation Algorithms (DGAs) are a key tool for threat actors. As DGAs become more sophisticated and increasingly difficult to detect, zvelo’s Cybersecurity Team recommends heightened awareness and shares what you need to know.
zvelo’s Cybersecurity Team shares how you can use Cyber Threat Intelligence (CTI) to successfully deliver actionable intelligence to support executive decision making which protects your Operating Environment (EO).
From a threat intelligence perspective, this post presents the Tactic, Technique and Procedure (TTP), which can be best described as Living Off The Land at Scale (LOTLS).
Phishing threats are not homogeneous in nature. Malicious actors use several different phishing attack topologies to execute their campaigns – each of which require a different approach to detect and mitigate the threat.
WordPress is an easy target and attackers are compromising vulnerable and misconfigured deployments to serve Qakbot and other malware.
zvelo’s Cybersecurity experts share recommendations for a core set of cybersecurity tools which can be deployed for robust and balanced security throughout the different layers in the Circle of Trust.
zvelo Cybersecurity shares examples of potentially suspicious sites and Tactics, Techniques & Procedures (TTP) MCAs use to exploit COVID-19 related domains.
The resurgence of the Emotet trojan reminds us of these 5 habits everyone should develop to maximize your organization’s online security.