Smishing: A Growing Phishing Threat
Communication via SMS is globally ubiquitous and attackers increasingly leverage Smishing to distribute phishing links to bait their victims.
Threat intelligence is information and data which cybersecurity professionals use to prepare for, as well as to detect and protect organizations and end users from cyber attacks carried out by malicious threat actors.
Actionable threat data pertaining to an organization’s information systems, networks, or digital assets is intended to inform cybersecurity and threat teams about potential risks and existing or emerging threats. As cybercriminals continue to grow more sophisticated in their attack tactics, gathering and leveraging threat data is a critical element to protecting your infrastructure and assets against cyber attacks and building a proactive, rather than reactive, cyber defense strategy.
Communication via SMS is globally ubiquitous and attackers increasingly leverage Smishing to distribute phishing links to bait their victims.
As Ransomware attacks continue to make headlines, organizations must evolve towards fighting Ransomware with a Defense in Depth strategy.
Completing the CTI Process Loop blog series, this post focuses on the last three stages of the CTI Loop: Analysis, Dissemination & Feedback.
zvelo releases its first Cyber Threat Intelligence Malicious Trends Report for insights into current threats and exploits on the ActiveWeb.
Learn about the CTI Collection and Processing stages of the feedback loop and how zvelo leverages each stage for Cyber Threat Intelligence.
Black Hat 2020, emphasizing an aim to undermine the legitimacy of the upcoming US elections, observations from zvelo’s Cybersecurity Team.
We’ve put together this glossary of cyber threat definitions as a resource for you in your quest to help make the internet a safer place for all!
Domain Generation Algorithms (DGAs) are a key tool for threat actors. As DGAs become more sophisticated and increasingly difficult to detect, zvelo’s Cybersecurity Team recommends heightened awareness and shares what you need to know.
zvelo’s Cybersecurity Team shares how you can use Cyber Threat Intelligence (CTI) to successfully deliver actionable intelligence to support executive decision making which protects your Operating Environment (EO).
From a threat intelligence perspective, this post presents the Tactic, Technique and Procedure (TTP), which can be best described as Living Off The Land at Scale (LOTLS).