This article series examines phishing attacks that faded from popularity but are now resurging — in particular, malicious Office documents.| zvelo
A Global Cobalt Strike activity trend analysis over Q1 of 2022 offers situational awareness into one of the most prevalent attack frameworks.| zvelo
Threat Advisory: Attackers are using file-sharing services like Smash or WeTransfer to deliver Bumblebee malware disguised as RFPs.| zvelo
This last post in our social engineering prevention series provides guidance on what to do if you fall victim to a social engineering attack.| zvelo
The latest string of attacks using Qakbot malware are breaching networks and successfully deploying ransomware in less than half a day.| zvelo
When it comes to malicious vs objectionable sites, these are the distinctions between malicious site content and objectionable site content.| zvelo
Understanding how malicious and phishing threat data gets curated is crucial to assessing the value of curated cyber threat intelligence.| zvelo
This broad overview of cybercrime includes the main types of cybercrime, underlying motivations, societal impact, and tactics for prevention.| zvelo
This post explores malicious detection in depth including the types of threats, use cases, common tools and methodologies used for detection.| zvelo
DNS Filtering has become the 'table-stakes' starting point for powering the DNS-Layer Security piece of the SASE cybersecurity framework.| zvelo
A curated threat intelligence approach, in which aging data is managed based on current attack status, is crucial to preventing cybercrime.| zvelo
Attackers are using sophisticated TTPs like Adversary-in-the-Middle (AiTM) phishing attacks to steal session cookies and bypass MFA security.| zvelo
This blog explores the realm of dark Large Language Models (LLMs) and their role in revolutionizing cyberattacks.| zvelo
AI-fueled social engineering tactics are a potent initial infection vector for ransomware as well as a myriad of other cyber threats.| zvelo
This post explores the integral role of threat intelligence in a Defense in Depth strategy and the necessity of high-quality threat data.| zvelo