The threat landscape continues to evolve—individual and state-backed hackers and agencies become increasingly emboldened to compromise websites and servers, steal CPU cycles for cryptocurrency mining, embark on social engineering efforts to find backdoors, and sway public opinion through fake news and other measures. zvelo provides the most advanced URL/IP categorization database for web filtering, whitelists and blacklists, and residential and business protections against bad actors and malicious online behavior. Explore our network security solutions, cyber threat map, and malicious exploit detection offerings for the most advanced threat intelligence available to OEMs and device manufacturers.

2019 Cybersecurity & Tech Trend Predictions

2019 Cybersecurity & Tech Trend Predictions

Estimated Reading Time: 13 minutes 2018 was a wild year for cybersecurity, ad tech, and the internet in general. In this blog, we explore the significant trends and security challenges that are likely to impact us in 2019 and beyond.

Categorizing 99.9% of the ActiveWeb

Categorizing 99.9% of the ActiveWeb with a Hybrid AI/ML Approach

Estimated Reading Time: 9 minutes Learn about zvelo’s unique hybrid approach to web content categorization and malicious detection. With over 20 years of experience and partnerships with some of the world’s leading anti-virus, MSSPs, and communications companies—zvelo’s next-generation approach achieves industry-leading coverage and accuracy for end users worldwide.

Major Ad Fraud Operation “3ve” Taken Down Thanks to Industry Collaboration

Estimated Reading Time: 4 minutes The Department of Justice this week announced and unsealed charges against eight individuals involved in a massive digital advertising fraud network. Led by the FBI with assistance from a number of companies in the cybersecurity and ad tech industries, “Operation Eversion”, as it has been dubbed, followed and seized infrastructure belonging to the “3ve” ad-fraud scam network.


Homograph Attack | Internationalized Domain Name Attack

What is an IDN Homograph Attack and How Do You Protect Yourself?

Estimated Reading Time: 5 minutes An internationalized domain name (IDN) homograph attack is a method of deceiving computer users about the remote computer they’re communicating with. It exploits the fact that many characters are homographs, meaning they look alike. Homographs allow a malicious party to create an IDN that appears very similar to an established domain, which can then be used to lure users to the new website.

Anatomy of a Full Path URL | Protocol, Hostname, Base Domain, Path, ETc.

The Anatomy of a Full Path URL: Hostname, Protocol, Path, and More…

Estimated Reading Time: 6 minutes In a previous blog, we explored the important differences between base domains and full path URLs. In this post, we wanted to take a step back and cover the basics—the individual structural elements of a URL (Uniform Resource Locator).

9 Tips to Improve Security Against Mobile Phishing

9 Tips to Improve Your Organization’s Security Against Mobile Phishing Attacks

Estimated Reading Time: 11 minutes Over the past several years, there’s been a significant increase in mobile phishing attacks—particularly targeting enterprises. In this blog, we cover 9 tips and strategies to improve your security against mobile phishing attacks.

2018 Stripe Phishing Scam - Fraudulent Login Landing Page

2018 Phishing Campaign Against Stripe Payment Processing Users

Estimated Reading Time: 5 minutes Over the years, cybercriminals have deployed increasingly sophisticated scams to deceive users of payment processing systems—particularly small and medium sized business owners—into compromising their accounts by unknowingly divulging account credentials. Here’s an example of a recent phishing campaign from Fall 2018 targeting Stripe users.