This article discusses Symbolic Link (SYLK) files and how the old method of data exchange is now being used to gain entry to organizations.
Tactics, Techniques, and Procedures (TTPs) is a key concept in cybersecurity and threat intelligence. The purpose is to identify patterns of behavior which can be used to defend against specific strategies and threat vectors used by malicious actors.
This is the first article of a three-part series where we examine phishing attacks that faded from popularity but are now resurging — in particular, malicious Office documents.
Malware Analysis uncovers hidden attackers actively exploiting your network, identifies latent infections and analyzes captured payloads.
Reduce your cyber threat risk by leveraging a Brand Vulnerability Assessment to identify the vulnerabilities and weaknesses which leave your brand exposed to attacks.
This post defines the strategic, operational and tactical levels of cyber threat intelligence, who uses it and how it protects organizations and users.
Rife with vulnerabilities that are actively probed by MCAs, connected consumer-grade equipment is poised to be the next attack surface.
The intersection of infrastructure and influence creates linkages which may become discoverable and aid cyber defenders in catching MCAs.
zvelo’s Response to the SolarWinds Attack Protected its Clients and Partner Network of 600+ Million End Points and Users Across the Globe. Learn more.
We’ve put together this glossary of cyber threat definitions as a resource for you in your quest to help make the internet a safer place for all!
From a threat intelligence perspective, this post presents the Tactic, Technique and Procedure (TTP), which can be best described as Living Off The Land at Scale (LOTLS).