From a threat intelligence perspective, this post presents the TTP which can be best described as Living Off The Land at Scale (LOTLS).| zvelo
Threat Alert: Active PayPal payment request scam uses social engineering to exploit users and evade detection without the use of a link.| zvelo
The intersection of infrastructure and influence creates linkages which may become discoverable and aid cyber defenders in catching MCAs.| zvelo
This broad overview of cybercrime includes the main types of cybercrime, underlying motivations, societal impact, and tactics for prevention.| zvelo
Tactics, Techniques, and Procedures (TTPs) is a key concept in threat intelligence used to identify patterns of behavior used by malicious threat actors.| zvelo.com
2021 marked a record year for financial losses due to Business Email Compromise. What you need to know about BEC Attacks for 2022.| zvelo.com
PhishBlocklist protects users and end points from emerging and active phishing threats with market-leading Phishing Intelligence| zvelo
Discover the anatomy of phishing attacks, and how to improve your defenses with the right phishing detection tools for the many attack types.| zvelo