The threat landscape continues to evolve—individual and state-backed hackers and agencies become increasingly emboldened to compromise websites and servers, steal CPU cycles for cryptocurrency mining, embark on social engineering efforts to find backdoors, and sway public opinion through fake news and other measures. zvelo provides the most advanced URL/IP categorization database for web filtering, whitelists and blacklists, and residential and business protections against bad actors and malicious online behavior. Explore zvelo’s Cybersecurity and threat intelligence data feeds for industry leading malicious and phishing exploit detection and the most advanced cyber threat intelligence available to OEMs and device manufacturers.
A leading CASB company required a highly accurate and extremely fast URL vetting solution to help identify links to malware and other malicious threats for cloud-hosted documents, applications and associated sync services.
DetailsAfter December 31, 2015, SSL certificates that use the SHA-1 hash algorithm for their signature will be declared “technology non grata” on the modern Internet. It’s important to note that this is an industry-wide change and not specific to just zvelo’s products. As a result, beginning January 1, 2016, all partners (and everyone in general) will need to support SHA-2 SSL signed certificates in order to download updates and patches for all of zvelo’s offerings.
Demonstrating the need for increased security against malware and malicious website, reports have emerged of a group of unknown hackers that broke into Bangladesh’s central bank. Once in, they obtained the credentials needed for payment transfers from Federal Reserve Bank of New York and then transferred large sums to fraudulent accounts based in the Philippines…
A new US/EU arrangement puts stronger regulations on companies in the U.S. to protect the personal data of Europeans and stronger monitoring and enforcement by the U.S. A few highlights that new arrangement will include: Strong obligations on companies handling Europeans’ personal data and robust enforcement. U.S. companies wishing to import personal data from Europe…
The Web Filtering Provider was experiencing increased demand for a reliable, cost-effective and hosted web filtering offering to complement its existing hosted spam filtering service. With customers geographically distributed…
DetailsThe cyber arms race just got crazier. You’ve heard of SaaS…DaaS… now there’s MaaS – “Malware as a Service,” empowering and enabling cyber criminals.
The Mobile Security Vendor was looking for ways to differentiate its smartphone security offering by adding Web browsing protection against compromised and malicious websites, as well as the ability to provide…
DetailsOn June 26th, Kathy Leake, CEO of Qualia, wrote a very thoughtful column entitled “We Need Clearer Fraud Definitions, More Standard Measurement.” In it, she called for fraud definitions to be agreed upon between buyers and sellers and for pre-emptive fraud protection. We couldn’t agree more! On the fraud definitions, there are very clear cases…
The Magnitude of the Breach On Thursday, June 4, it was announced that there was a large breach of the Office of Personnel Management (OPM) of the federal government. The Chinese are fingered in the breach, in which about 4 million people’s records were lost in the attack, and the Chinese government denied being responsible,…
The Solution Provider had carved out a large and growing market of professionals and business travelers who required secure, safe Internet access and browsing, combined with the convenience and availability of…
Details