Phishing Attack Topologies
Phishing threats are not homogeneous in nature. Malicious actors use several different phishing attack topologies to execute their campaigns – each of which require a different approach to detect and mitigate the threat.
Tactics, Techniques, and Procedures (TTPs) is a key concept in cybersecurity and threat intelligence. The purpose is to identify patterns of behavior which can be used to defend against specific strategies and threat vectors used by malicious actors.
Phishing threats are not homogeneous in nature. Malicious actors use several different phishing attack topologies to execute their campaigns – each of which require a different approach to detect and mitigate the threat.
WordPress is an easy target and attackers are compromising vulnerable and misconfigured deployments to serve Qakbot and other malware.
Soaring profits and easy targets are driving cyber criminals to capitalize on the business of Ransomware-as-a-Service (RaaS).
zvelo Cybersecurity shares examples of potentially suspicious sites and Tactics, Techniques & Procedures (TTP) MCAs use to exploit COVID-19 related domains.
Malicious Cyber Actors increasingly exploit seemingly legitimate whitelisted sites to deliver malware, utilizing our own tools and trust against us.
Lured by the growing success of SMS, MMS and RCS mobile marketing platforms, cyber criminals take advantage of user behavior to expand SMS threat landscape.
In a previous blog, we explored the important differences between base domains and full path URLs. In this post, we wanted to take a step back and cover the basics—the individual structural elements of a URL (Uniform Resource Locator).