The threat landscape continues to evolve—individual and state-backed hackers and agencies become increasingly emboldened to compromise websites and servers, steal CPU cycles for cryptocurrency mining, embark on social engineering efforts to find backdoors, and sway public opinion through fake news and other measures. zvelo provides the most advanced URL/IP categorization database for web filtering, whitelists and blacklists, and residential and business protections against bad actors and malicious online behavior. Explore our network security solutions, cyber threat map, and malicious exploit detection offerings for the most advanced threat intelligence available to OEMs and device manufacturers.

Tech Throwback: The Original IPAD

Tech Throwback: Remembering the Original IPAD

Estimated Reading Time: 6 minutes This year for National Cybersecurity Awareness Month, we thought we’d take a look back at the original IPAD. No, not the popular tablet from Apple awaiting a design refresh—and leaving tech enthusiasts crawling through rumor sites. No, we’re referring to the Internet Protocol Adapter (IPAD)—the next-generation all-in-one security and gateway device for accessing Bulletin Board Systems and online services from the 1990’s.

2018 Apple ID Phishing Scam

Increase in Mobile Phishing Scams Targeting Apple ID Users

Estimated Reading Time: 3 minutes A trend forming among newly identified phishing URLs shows bad actors sending fraudulent emails informing Apple ID users of outdated Apple ID information or problems with billing. The emails and internal links attempt to deceive Apple ID users into “verifying” account information. When the user proceeds to log in, the form handing over access credentials to their accounts.

Secret To the Market's Most Accurate and Comprehensive Web Categorization Service

Secret to the Market’s Most Accurate and Comprehensive Web Categorization Service

Estimated Reading Time: 3 minutes Over many years or testing, trial and error, zvelo ultimately determined that a human-machine “hybrid” approach to classification produced the best outcomes. The Human element provided the verifications necessary for the highest levels of accuracy, while machines (ie. AI/ML models and calculations) provided the scaling necessary to deal with the incredible volumes of new URLs and content being published at an increasing rate.

Using DNS RPZ to Protect Against Malicious Threats

Using DNS RPZ to Protect Against Malicious Threats

Estimated Reading Time: 7 minutes As discussed in a previous blog, DNS RPZ provides IT teams and network administrators with a “DNS configuration layer”, or rewrite module, to effectively handle DNS responses with the open source domain name system software, BIND.

Malicious Cryptocurrency Mining, Cryptomining, Cryptojacking, Malmining

What is Malicious Cryptocurrency Mining?

Estimated Reading Time: 8 minutes First off, let’s make it clear that there is nothing inherently malicious about the act of cryptocurrency mining. Rather, over the past couple of years cybercriminals and bad actors have leveraged existing exploits and found unsecured hardware to implant Cryptocurrency Mining code and steal CPU/GPU cycles from computer owners and website visitors without their knowledge. These activities are what we refer to as “Malicious Cryptocurrency Mining”.

Advantages of DNS RPZ | How It Works

Advantages of RPZ: Basics & Common Configurations

Estimated Reading Time: 5 minutes Since the release of BIND 9 in 2010, RPZ has proven a powerful technology for security and network management—allowing organizations to implement an additional DNS configuration layer. In fact, BIND is the most widely used Domain Name System software on the internet—making RPZ configuration options like integrating commercial feeds, blocklists, and URL databases like zveloDB™ all the more attractive. So let’s take a moment to revisit the advantages of RPZ.

Base Domain vs. Full Path URL. What's the Difference?

Base Domain URL vs. Full Path URL. What’s the Difference?

Estimated Reading Time: 5 minutes For the average web surfer, the URL bar provides a magical portal to the interwebz where anything that can be thought of can be entered—revealing the treasures of the internet at the stroke of ‘enter’. For the rest of us, we know it gets much more complicated than that as we slip down the rabbit hole and into OSI, DNS, TLS, HTTPS, subdomains…

Dynamic Device Profiling & Anomaly Detection with IoTAgenda

Estimated Reading Time: < 1 minute Particularly with the proliferation of IoT devices—network security has grown increasingly porous—leaving gaping holes. zvelo is working with router and gateway manufacturers to provide an IoT Security Platform that dynamically and actively profiles and monitors ALL network-connected devices—giving you complete network visibility to improve security for customer networks.

Details