A Global Cobalt Strike activity trend analysis over Q1 of 2022 offers situational awareness into one of the most prevalent attack frameworks.| zvelo
This last post in our social engineering prevention series provides guidance on what to do if you fall victim to a social engineering attack.| zvelo
The latest string of attacks using Qakbot malware are breaching networks and successfully deploying ransomware in less than half a day.| zvelo
This post explores AI and Machine Learning for cybersecurity, including the various types, applications, challenges, and future potential.| zvelo
Soaring profits and easy targets are driving cyber criminals to capitalize on the business of Ransomware as a Service (RaaS).| zvelo
Threat Alert: Active PayPal payment request scam uses social engineering to exploit users and evade detection without the use of a link.| zvelo
This post explores malicious detection in depth including the types of threats, use cases, common tools and methodologies used for detection.| zvelo
As we explore the critical role of data in powering the SASE solutions suite, this post focuses on the Firewall-as-a-Service.| zvelo
A comprehensive overview of cyber threat intelligence: what it is, how it's used, the process lifecycle, use cases, and evaluation guidelines.| zvelo
zvelo takes you behind the scenes of a phishing attack to show you the TTPs attackers use to gain network access and establish persistence.| zvelo
Social engineering attacks are a type of cybercrime that human weakness by using psychological manipulation to trick individuals.| zvelo
A curated threat intelligence approach, in which aging data is managed based on current attack status, is crucial to preventing cybercrime.| zvelo
This blog explores the realm of dark Large Language Models (LLMs) and their role in revolutionizing cyberattacks.| zvelo
Explore how AI jailbreaking enables novice and unskilled attackers to launch sophisticated cyber-attacks, reshaping the threat landscape.| zvelo
Modern cyber risk management requires understanding ransomware. This post covers the basics from infiltration to extortion, plus prevention.| zvelo