The Browser-in-the-Browser (BitB) attack technique makes it easier for attackers to mount social engineering campaigns for credential harvesting.| zvelo
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as Network Sniffing, Transmitted Data Manipulation, or replay attacks (Exploitation for Credential Access). By abusing features of common networking protocols that can determine the flow of network traffic (e.g. ARP, DNS, LLMNR, etc.), adversaries may force a device to communicate through an adversary controlled system so th...| attack.mitre.org
Tactics, Techniques, and Procedures (TTPs) is a key concept in threat intelligence used to identify patterns of behavior used by malicious threat actors.| zvelo.com
2021 marked a record year for financial losses due to Business Email Compromise. What you need to know about BEC Attacks for 2022.| zvelo.com
PhishBlocklist protects users and end points from emerging and active phishing threats with market-leading Phishing Intelligence| zvelo
zveloCTI provides curated, high veracity, actionable Threat Intelligence feeds on phishing websites, malicious URLs, & suspicious new domains.| zvelo
Discover the anatomy of phishing attacks, and how to improve your defenses with the right phishing detection tools for the many attack types.| zvelo
Phishing Activity Trends Reports| apwg.org
Modern cyber risk management requires understanding ransomware. This post covers the basics from infiltration to extortion, plus prevention.| zvelo