Advanced threat and exploit detection for residential and business. Malicious detection capabilities empower MSSPs, ISPs, TELCOs, network security providers, and VARs to provide world-class protection. Gain advanced insight with the most accurate URL database for malicious exploit detection to better understand the cyber threat landscape. Categories include Command and Control, Malware, Spyware, Spam URLs, Cryptocurrency Mining, Phishing and Fraud, and more.

IoT Cybersecurity Reaches Tipping Point

IoT Cybersecurity Reaching Tipping Point

In an article on ITPro, Jeff Finn writes about how the state of IoT cybersecurity is reaching a tipping point, forcing IoT device manufacturers to work partners that excel at networking. “The writing on the wall for IoT device manufacturers is to get serious about security and develop fruitful channel partnerships with network technology providers.

CRN Interviews zvelo

CRN interviews zvelo CEO on New IoT Security Offering to Detect Compromised Devices

CRN Exclusive: zvelo Introduces IoT Security Offering To Detect Compromised Devices CRN: News, Analysis, and Perspective for VARs, and Technology Integrators *The following article, by Lindsey O’Donnell, is featured on CRN‘s website and was originally published on October 2, 2017. Network security company zvelo Monday unveiled an IoT security offering that uses artificial intelligence to automate the way enterprises discover and…

devil's ivy

Devil’s Ivy Vulnerability Targets IoT Devices’ Open Source Code Library

By Eric Watkins, Senior Malicious Detection Researcher at zvelo This week, a new security vulnerability subject to remote attack, known as Devil’s Ivy, is targeting the c++ library used by thousands of different IoT device vendors. The most popular devices being compromised are IoT video cameras; however,  the associated risk is not limited to video…

InfoSecurity Magazine Features How IoT Device Discovery and Activity Detection Can Work by Jeff Finn of zvelo

*****The following article, by Jeff Finn, appears as an online article in the Opinion section on InfoSecurity Magazine Home’s web site and was originally published on July 13, 2017. In InfoSecurity Magazine: How IoT Device Discovery and Activity Detection Can Work by Jeff Finn, CEO of zvelo Even as IoT device volume races towards 200 billion by 2020, the…

Top Four Tips to Mitigate Ransomware Attacks Like Petya

by Eric Watkins, Senior Malicious Detection Researcher at zvelo Ransomware and malware attacks are not going to go away anytime soon, rather they are becoming increasingly more common. Last month we wrote about the malware ransomware campaign, WannaCry and now we’ll discuss yesterday’s ransomware campaign Petya which exploits another one of the many vulnerabilities released…