This article series examines phishing attacks that faded from popularity but are now resurging — in particular, malicious Office documents.| zvelo
Threat Advisory: Attackers are using file-sharing services like Smash or WeTransfer to deliver Bumblebee malware disguised as RFPs.| zvelo
The intersection of infrastructure and influence creates linkages which may become discoverable and aid cyber defenders in catching MCAs.| zvelo
zvelo takes you behind the scenes of a phishing attack to show you the TTPs attackers use to gain network access and establish persistence.| zvelo
A curated threat intelligence approach, in which aging data is managed based on current attack status, is crucial to preventing cybercrime.| zvelo
Attackers are using sophisticated TTPs like Adversary-in-the-Middle (AiTM) phishing attacks to steal session cookies and bypass MFA security.| zvelo