Estimated Reading Time: 3 minutes A trend forming among newly identified phishing URLs shows bad actors sending fraudulent emails informing Apple ID users of outdated Apple ID information or problems with billing. The emails and internal links attempt to deceive Apple ID users into “verifying” account information. When the user proceeds to log in, the form handing over access credentials to their accounts.
Estimated Reading Time: 3 minutes Unless you are living under a rock, you are probably very familiar or at least aware of the purported bias in the news. Depending on your political leanings, you may have strong opinions and ideas about the veracity of your news sources (and those you don’t favor).
Estimated Reading Time: 3 minutes As a web content categorization company, we are intensely focused on the trends in the types of content being published on the web, how this content is accessed, used and shared, who is publishing the content, and hundreds of other details that goes into our efforts to provide the market’s best web categorization services.
Estimated Reading Time: 17 minutes We’ve put together this glossary of cyber threat definitions as a resource for you in your quest to help make the internet a safer place for all!
Estimated Reading Time: 3 minutes Over many years or testing, trial and error, zvelo ultimately determined that a human-machine “hybrid” approach to classification produced the best outcomes. The Human element provided the verifications necessary for the highest levels of accuracy, while machines (ie. AI/ML models and calculations) provided the scaling necessary to deal with the incredible volumes of new URLs and content being published at an increasing rate.
Estimated Reading Time: 5 minutes A sensational headline. A heart-wrenching image. We can’t look away. We can’t resist clicking. And click, we look, we like—and voila—we have just helped shape today’s news cycle. Without even realizing, we have just been swept up in our own News Vacuum.
Estimated Reading Time: 7 minutes As discussed in a previous blog, DNS RPZ provides IT teams and network administrators with a “DNS configuration layer”, or rewrite module, to effectively handle DNS responses with the open source domain name system software, BIND.
Estimated Reading Time: 2 minutes Savvy marketers, politicians, and publishers all capitalize on the public’s emotional response to these sorts of triggers. Their objectives vary. Inform readers/viewers? Possibly. Drive traffic and more clicks? Definitely.
Estimated Reading Time: 8 minutes First off, let’s make it clear that there is nothing inherently malicious about the act of cryptocurrency mining. Rather, over the past couple of years cybercriminals and bad actors have leveraged existing exploits and found unsecured hardware to implant Cryptocurrency Mining code and steal CPU/GPU cycles from computer owners and website visitors without their knowledge. These activities are what we refer to as “Malicious Cryptocurrency Mining”.
Estimated Reading Time: 5 minutes Since the release of BIND 9 in 2010, RPZ has proven a powerful technology for security and network management—allowing organizations to implement an additional DNS configuration layer. In fact, BIND is the most widely used Domain Name System software on the internet—making RPZ configuration options like integrating commercial feeds, blocklists, and URL databases like zveloDB™ all the more attractive. So let’s take a moment to revisit the advantages of RPZ.