The Digital Services Act sets the stage for a new era of digital regulation in the EU by making what is illegal offline, illegal online.
zveloDB is the industry’s most advanced and comprehensive URL Categorization Database which categorizes content into topic-based, objectionable, and malicious category groupings for applications including DNS filtering, web content filtering, brand safety & contextual targeting, and subscriber analytics.
zvelo recognizes National Human Trafficking Awareness Day. Our mission is to make the internet safer and more secure.
zvelo’s meticulously curated datasets for Malicious URLs, Phishing URLs, and Web Content Categorizations, support new tiered service offering and drive revenue growth for a global Remote Browser Isolation provider.Details
Mobile security platform leverages zvelo’s full-path URL classification to identify malicious and suspicious URLs appearing within whitelisted sites.Details
While both can be harmful, dangerous, or threaten the safety of online users, there are very clear distinctions between Malicious vs Objectionable content. Understand how zvelo differentiates between them.
OEMs receive notification that the RuleSpace URL database is going end of life (EoL) leaving security partners scrambling to find a RuleSpace alternative.Details
Alex Wood from the Colorado = Security Podcast sat down with zvelo President & CEO, Jeff Finn, to discuss zvelo’s background and position in the Information Security space.Details
Over many years or testing, trial and error, zvelo ultimately determined that a human-machine “hybrid” approach to classification produced the best outcomes. The Human element provided the verifications necessary for the highest levels of accuracy, while machines (ie. AI/ML models and calculations) provided the scaling necessary to deal with the incredible volumes of new URLs and content being published at an increasing rate.
As discussed in a previous blog, DNS RPZ provides IT teams and network administrators with a “DNS configuration layer”, or rewrite module, to effectively handle DNS responses with the open source domain name system software, BIND.
First off, let’s make it clear that there is nothing inherently malicious about the act of cryptocurrency mining. Rather, over the past couple of years cybercriminals and bad actors have leveraged existing exploits and found unsecured hardware to implant Cryptocurrency Mining code and steal CPU/GPU cycles from computer owners and website visitors without their knowledge. These activities are what we refer to as “Malicious Cryptocurrency Mining”.