Skip to content
zvelo
We Categorize the Web®
zvelozvelo
  • Products
    • zveloDB™ URL Database
    • zveloCAT™ Real-Time URL Classifications
    • zveloCTI™ Cyber Threat Intelligence
    • PhishBlocklist™ Phishing Intelligence
    • Malicious Detailed Detection Feed™ Malicious Intelligence
  • Solutions
    • Extended Detection and Response (XDR)
    • Secure Access Service Edge (SASE)
    • Managed Security Service Providers (MSSPs)
    • Threat Research
    • Web & DNS Filtering
    • Brand Safety & Contextual Targeting
  • Resources
    • Threat Intelligence Reports
    • Blog, News & Press
    • Case Studies
    • Datasheets and White Papers
    • Videos, Webinars, & Virtual Events
  • Contact Us
Check a URL
  • Products
    • zveloDB™ URL Database
    • zveloCAT™
    • zveloCTI™ Cyber Threat Intelligence
    • PhishBlocklist™ | Phishing Intelligence
    • Malicious Detailed Detection Feed™
  • Solutions
    • Extended Detection and Response (XDR)
    • Secure Access Service Edge (SASE)
    • Managed Security Service Providers (MSSPs)
    • Threat Research
    • Web & DNS Filtering
    • Brand Safety & Contextual Targeting
  • Resources 
    • Threat Intelligence Reports
    • Blog, News & Press
    • Case Studies
    • Datasheets and White Papers
    • Videos, Webinars, & Virtual Events
  • Contact Us
  • zveloLIVE

Category: Network Security

You are here:
  1. Home
  2. Cybersecurity
  3. Category "Network Security"

cybercrime-prevention-requires-premium-threat-intelligence

Premium Threat Intel: A Vital Investment in Cybercrime Prevention

Cyber Threat Intelligence, Cybercrime, Cybersecurity, Information Security, Malicious Detection, Network Security, Phishing DetectionBy zveloDecember 19, 2022

A curated threat intelligence approach, in which aging data is managed based on current attack status, is crucial to preventing cybercrime.

zveloCTI Business Justification Case Study

By zveloNovember 28, 2022

zvelo’s threat intelligence delivers significant cost savings and powerful improvements to the Client’s threat detection capabilities.

Details

AitM-Adversary-in-the-Middle-Attacker-TTP-to-bypass-MFA-security

AiTM Phishing Attacks: Keeping Up with Attacker TTPs

Cyber Threat Intelligence, Cybersecurity, Malicious Detection, Network Security, Phishing DetectionBy zveloNovember 10, 2022

Attackers are turning up the heat with advanced TTPs like Adversary-in-the-Middle (AiTM) phishing attacks to steal session cookies and bypass MFA security.

OSINT-vs-Commercial-Threat-Intelligence

OSINT vs Commercial Threat Intelligence

Cyber Threat Intelligence, Cybersecurity, Information Security, Malicious Detection, Network Security, Phishing DetectionBy zveloOctober 26, 2022

OSINT vs Commercial Threat Intelligence – A high level overview weighing the pros and cons for each type of threat feed.

RBI-SASE-Protection-Against-Browser-Based-Attacks

Remote Browser Isolation: SASE Protection Against Browser-Based Attacks

Cyber Threat Intelligence, Cybersecurity, Information Security, Malicious Detection, Network Security, Phishing DetectionBy zveloSeptember 29, 2022

Remote Browser Isolation (RBI) is the piece of the SASE framework that is focused on securing the end user’s web browsing experience.

CASB-Extending-SASE-threat-protection-to-the-Cloud

Extending Threat Protection to Cloud Applications with CASBs

Cyber Threat Intelligence, Cybersecurity, Malicious Detection, Network Security, Phishing DetectionBy zveloAugust 29, 2022

DNS Filtering and SWGs can offer core security functionality but the SASE framework requires CASBs to extend threat protection to cloud apps.

Data-makes-the-difference-for-powering-the-SWGs-in-a-sase-framework

Secure Web Gateway: Data Makes the Difference

Cyber Threat Intelligence, Cybersecurity, Malicious Detection, Network Security, Phishing DetectionBy zveloAugust 15, 2022

Secure Web Gateways complement DNS Filtering to deliver the minimum level of threat protection capabilities required in a SASE framework.

predictive-phishing-campaign-alert-USPS-and-electrum-wallet-examples

Active Phishing Campaign Alert

Cyber Threat Intelligence, Cybersecurity, Network Security, Phishing DetectionBy zveloAugust 3, 2022

Active Threat Alert: Protect against active phishing campaigns serving up personalized and uniquely randomized URL paths or subdomains.

Honeypots-baiting-attackers-uncovering-malicious-payloads-coinmining

Baiting Attackers to Identify Malicious Payloads Like CoinMiners

Cyber Threat Intelligence, Cybersecurity, Malicious Detection, Network SecurityBy zveloAugust 2, 2022

This post illustrates how you can leverage the threat intel from honeypots to identify malicious payloads like CoinMiners to block cryptojacking attempts.

threat-alert-USPS-personalized-URL-phishing-attack-zveloCTI

Threat Alert: Active USPS Phishing Attack

Cyber Threat Intelligence, Cybersecurity, Network Security, Phishing DetectionBy zveloJuly 15, 2022

Threat Alert: zvelo’s PhishBlocklist identifies a very active USPS phishing attack using personalized URLs that target USPS customers.

→123456→
zvelo | We Categorize the Web® | Footer Logo

+1 (720) 897-8113
+1 (877) 77-zvelo (Toll Free)
+1 (720) 897-6544 (Fax)

zvelo US Headquarters Denver, Colorado USA

Contact Us
Products
  • zveloDB™ URL Database
  • zveloCAT™
  • zveloCTI™ Cyber Threat Intelligence
  • Malicious Detailed Detection Feed™
  • PhishBlocklist™
Solutions
  • Extended Detection and Response (XDR)
  • Secure Access Service Edge (SASE)
  • Managed Security Service Providers (MSSPs)
  • Threat Research
  • Web & DNS Filtering
  • Brand Safety & Contextual Targeting
Resources
  • Threat Intelligence Reports
  • Blog, News & Press
  • Case Studies
  • Datasheets and White Papers
  • Videos, Webinars, & Virtual Events
  • Cyber Threat Definitions
Company
  • About zvelo
  • Contact Us
  • Careers at zvelo
  • Executive Leadership
  • Privacy
  • Legal
More

2023 zvelo, Inc. All rights reserved.

Go to Top