Emotet’s Return Foreshadows Surge in Ransomware
Commonly used by eCrime groups like Wizard Spider, the return of Emotet foreshadows a potential surge in ransomware attacks.
Tactics, Techniques, and Procedures (TTPs) is a key concept in cybersecurity and threat intelligence. The purpose is to identify patterns of behavior which can be used to defend against specific strategies and threat vectors used by malicious actors.
Commonly used by eCrime groups like Wizard Spider, the return of Emotet foreshadows a potential surge in ransomware attacks.
Threat Update: The Log4j vulnerability continues to be actively exploited. Immediate action to update and monitor potentially impacted systems is advised.
Threat Alert: The Log4j vulnerability has quickly been weaponized and is being used to exploit exposed systems. Here’s what you should know.
Understanding how malicious and phishing threat data gets curated is crucial to assessing the value of curated cyber threat intelligence.
This webinar details threat data from the CTI 2021 Malicious Trends Report to help you improve your threat posture and reduce cyber risk.
This cybersecurity interview covers zvelo’s thoughts on the threat landscape and the role of its cyber threat intelligence in threat protection.
See how zveloCTI aligns with the Pyramid of Pain IOCs to help assess the level of difficulty for tracking down an MCA within your environment.
zvelo takes you behind the scenes of a phishing attack to show you the TTPs attackers use to gain network access and establish persistence. There is far more than meets the eye.
Weaponizing Excel 4.0 Macros (XLM) is an easy, reliable method attackers use to gain entry into a target network and establish persistence.
This article discusses Symbolic Link (SYLK) files and how the old method of data exchange is now being used to gain entry to organizations.