Tag Archives: Threat Analysis Group | googblogs.com
This post shares a few highly effective social engineering examples using micro-targeting techniques based on LinkedIn profile attributes.| zvelo
Malicious Cyber Actors increasingly exploit seemingly legitimate whitelisted sites to deliver malware, utilizing our own tools and trust against us.| zvelo
This post explores malicious detection in depth including the types of threats, use cases, common tools and methodologies used for detection.| zvelo
Tactics, Techniques, and Procedures (TTPs) is a key concept in threat intelligence used to identify patterns of behavior used by malicious threat actors.| zvelo.com
Social engineering attacks are a type of cybercrime that human weakness by using psychological manipulation to trick individuals.| zvelo
Discover the anatomy of phishing attacks, and how to improve your defenses with the right phishing detection tools for the many attack types.| zvelo
Modern cyber risk management requires understanding ransomware. This post covers the basics from infiltration to extortion, plus prevention.| zvelo