Explore the mechanics of supply chain attacks, historical examples, and strategies to mitigate this growing cybersecurity threat.| zvelo
This article series examines phishing attacks that faded from popularity but are now resurging — in particular, malicious Office documents.| zvelo
A Global Cobalt Strike activity trend analysis over Q1 of 2022 offers situational awareness into one of the most prevalent attack frameworks.| zvelo
Threat Advisory: Attackers are using file-sharing services like Smash or WeTransfer to deliver Bumblebee malware disguised as RFPs.| zvelo
This last post in our social engineering prevention series provides guidance on what to do if you fall victim to a social engineering attack.| zvelo
Spear phishing at scale: A new era of AI fueled attacks where social engineering, social media, AI tools, and micro-targeting converge.| zvelo
This post explores AI and Machine Learning for cybersecurity, including the various types, applications, challenges, and future potential.| zvelo
AI has undoubtedly benefited threat actors, but how close are we to a world where AI-powered malware can autonomously invade a network?| zvelo
This post shares a few highly effective social engineering examples using micro-targeting techniques based on LinkedIn profile attributes.| zvelo
From a threat intelligence perspective, this post presents the TTP which can be best described as Living Off The Land at Scale (LOTLS).| zvelo
Threat Alert: Active PayPal payment request scam uses social engineering to exploit users and evade detection without the use of a link.| zvelo
The intersection of infrastructure and influence creates linkages which may become discoverable and aid cyber defenders in catching MCAs.| zvelo
Understanding how malicious and phishing threat data gets curated is crucial to assessing the value of curated cyber threat intelligence.| zvelo
This broad overview of cybercrime includes the main types of cybercrime, underlying motivations, societal impact, and tactics for prevention.| zvelo
This post explores malicious detection in depth including the types of threats, use cases, common tools and methodologies used for detection.| zvelo
From novice hackers to complex cybercriminal networks, see how attackers build detailed profiles of their social engineering attack targets.| zvelo
Social engineering prevention basics: Learn what it is, the red flags of an attack, and how your digital habits create organizational risks.| zvelo
Discover the anatomy of phishing attacks, and how to improve your defenses with the right phishing detection tools for the many attack types.| zvelo
To combat Generative AI phishing attacks, phishing training programs must prioritize technical aspects of detection over grammatical errors.| zvelo
From chatbots mimicking humans to voice synthesis and deepfakes that disorient and deceive, learn about AI's role in Social Engineering.| zvelo
AI-fueled social engineering tactics are a potent initial infection vector for ransomware as well as a myriad of other cyber threats.| zvelo
This post explores Defense-in-Depth, a comprehensive strategy with a multi-layered approach to modern threat protection.| zvelo
This post explores the integral role of threat intelligence in a Defense in Depth strategy and the necessity of high-quality threat data.| zvelo
Modern cyber risk management requires understanding ransomware. This post covers the basics from infiltration to extortion, plus prevention.| zvelo