Weaponizing Excel 4.0 Macros (XLM) is an easy, reliable method attackers use to gain entry into a target network and establish persistence.| zvelo
A Global Cobalt Strike activity trend analysis over Q1 of 2022 offers situational awareness into one of the most prevalent attack frameworks.| zvelo
A practical example into the understanding of Emotet's initial infection mechanisms to better protect your organization.| zvelo
Soaring profits and easy targets are driving cyber criminals to capitalize on the business of Ransomware as a Service (RaaS).| zvelo
This broad overview of cybercrime includes the main types of cybercrime, underlying motivations, societal impact, and tactics for prevention.| zvelo
This post explores malicious detection in depth including the types of threats, use cases, common tools and methodologies used for detection.| zvelo
A comprehensive overview of cyber threat intelligence: what it is, how it's used, the process lifecycle, use cases, and evaluation guidelines.| zvelo
Malicious Detailed Detection Feed delivers curated data + metadata to identify, confirm, and enrich intelligence on malicious IOCs| zvelo
PhishBlocklist protects users and end points from emerging and active phishing threats with market-leading Phishing Intelligence| zvelo
From chatbots mimicking humans to voice synthesis and deepfakes that disorient and deceive, learn about AI's role in Social Engineering.| zvelo
Modern cyber risk management requires understanding ransomware. This post covers the basics from infiltration to extortion, plus prevention.| zvelo