Spear phishing at scale: A new era of AI fueled attacks where social engineering, social media, AI tools, and micro-targeting converge.| zvelo
Malicious Cyber Actors increasingly exploit seemingly legitimate whitelisted sites to deliver malware, utilizing our own tools and trust against us.| zvelo
OSINT vs Commercial Threat Intelligence - A high level overview weighing the pros and cons for each type of threat feed.| zvelo
The intersection of infrastructure and influence creates linkages which may become discoverable and aid cyber defenders in catching MCAs.| zvelo
zvelo takes you behind the scenes of a phishing attack to show you the TTPs attackers use to gain network access and establish persistence.| zvelo