Skip to content
zvelo
We Categorize the Web®
zvelozvelo
  • Products
    • zveloDB™ URL Database
    • zveloCAT™ Real-Time URL Classifications
    • Threat Intelligence
    • Phishing Intelligence
    • SaaS App Intelligence
  • Use Cases
    • Web & DNS Filtering
    • (SASE) Secure Access Service Edge
    • (XDR) Extended Detection and Response
    • (DLP) Data Loss Prevention
    • (ZTNA) Zero Trust Network Access
    • (SPM) Security Posture Management
    • Secure Browsers
    • Human Risk Management
    • Threat Research
    • Brand Safety & Contextual Targeting
  • Resources
    • Blog, News & Press
    • Case Studies
    • zvelo’s Top SaaS Apps List
    • Datasheets, White Papers, & Reports
    • Videos, Webinars, & Virtual Events
  • Contact Us
Check a URL
  • Products
    • zveloDB™ URL Database
    • zveloCAT™
    • Threat Intelligence
    • Phishing Intelligence
    • SaaS App Intelligence
  • Use Cases
    • Web & DNS Filtering
    • (SASE) Secure Access Service Edge
    • (XDR) Extended Detection and Response
    • (DLP) Data Loss Prevention
    • (ZTNA) Zero Trust Network Access
    • (SPM) Security Posture Management
    • Secure Browsers
    • Human Risk Management
    • Threat Research
    • Brand Safety & Contextual Targeting
  • Resources 
    • Blog, News & Press
    • Case Studies
    • zvelo’s Top SaaS Apps List
    • Datasheets, White Papers, & Reports
    • Videos, Webinars, & Virtual Events
  • Contact Us
  • zveloLIVE

You are here:
  1. Home
PhishBlockList-phishing-intelligence-feed

PhishBlockList™ Phishing Threat Intelligence From zvelo

Announcements, News & PR, Cyber Threat Intelligence, Phishing DetectionBy zveloMarch 22, 2021

zvelo announces official release of PhishBlockList™ phishing threat intelligence feed leads the market for the fastest detection of active & emerging phishing threats.

Details
phishblocklist-cyber-threat-intelligence-phishing-detection

The Strategic, Operational, & Tactical Levels of Cyber Threat Intelligence

Cyber Threat Intelligence, Cybersecurity, Malicious Detection, Phishing DetectionBy zveloMarch 4, 2021

This post defines the strategic, operational and tactical levels of cyber threat intelligence, who uses it and how it protects organizations and users.

Details
cyberpatriot-mentoring-next-generation-cybersecurity-experts

CyberPatriot: zvelo Head of Cybersecurity Mentors the “Next Generation”

Announcements, News & PR, CybersecurityBy zveloFebruary 16, 2021

zvelo’s Head of Cybersecurity, Brad Rhodes, mentors the Colorado Early College teams of aspiring cybersecurity experts through the CyberPatriot program.

Details
zveloCTI-Emotet-document-analysis-threat-report

zvelo’s Cyber Threat Intelligence Team Shares In-Depth Analysis of Emotet

Announcements, News & PR, Cyber Threat Intelligence, Cybersecurity, Malicious DetectionBy zveloFebruary 15, 2021

Emotet: An In-Depth Document Analysis, is zvelo’s latest threat report intended to help defenders understand Emotet’s initial infection mechanisms so they may better protect their organizations.

Details
connected-consumer-grade-devices-the-next-attack-surface

Connected Consumer-Grade Equipment: The Next Attack Surface

Cyber Threat Intelligence, Cybersecurity, IoT Security Technology, MiscellaneousBy zveloJanuary 14, 2021

Rife with vulnerabilities that are actively probed by MCAs, connected consumer-grade equipment is poised to be the next attack surface.

Details
catching-mcas-intersection-infrastructure-and-influence

Catching MCAs at the Intersection of Infrastructure and Influence

Cyber Threat Intelligence, Cybersecurity, Information Security, Malicious Detection, Network Security, Phishing DetectionBy zveloJanuary 4, 2021

The intersection of infrastructure and influence creates linkages which may become discoverable and aid cyber defenders in catching MCAs.

Details
zvelo's-early-response-to-SolarWinds-attack-protects-massive-partner-network-sunburst-malware-fig-2

zvelo’s Early Response to SolarWinds Attack Protects Massive Partner Network

Cyber Threat Intelligence, Cybersecurity, Malicious Detection, Network Security, Phishing DetectionBy zveloDecember 17, 2020

zvelo’s Response to the SolarWinds Attack Protected its Clients and Partner Network of 600+ Million End Points and Users Across the Globe. Learn more.

Details
Smishing-SMS-Threat-Landscape

Smishing: A Growing Phishing Threat

Cybersecurity, Malicious Detection, Phishing DetectionBy zveloDecember 15, 2020

Communication via SMS is globally ubiquitous and attackers increasingly leverage Smishing to distribute phishing links to bait their victims.

Details
zvelocti-fight-ransomware-with-defense-in-depth-threat-intelligence

Fight Ransomware with Defense in Depth

Cyber Threat Intelligence, Cybersecurity, Malicious DetectionBy zveloNovember 11, 2020

As Ransomware attacks continue to make headlines, organizations must evolve towards fighting Ransomware with a Defense in Depth strategy.

Details
cyber-threat-intelligence-cti-analysis-dissemination-feedback

CTI: Analysis, Dissemination, and Feedback

Cyber Threat Intelligence, Cybersecurity, Malicious Detection, Phishing DetectionBy zveloOctober 19, 2020

Completing the CTI Process Loop blog series, this post focuses on the last three stages of the CTI Loop: Analysis, Dissemination & Feedback.

Details
←1
2345678
…910111213…
141516171819202122232425262728293031323334353637383940414243444546
47→
What Are You Looking For?
Browse By Category
  • Ad Tech & Brand Safety
  • AI & Machine Learning
  • Announcements, News & PR
  • Cybersecurity
  • Threat Intelligence
  • Internet Safety & Privacy
  • IoT Security Technology
  • Malicious Detection
  • Mobile & Subscriber Analytics
  • Phishing Detection
  • Technology & Insights
  • URL Database
  • Web Filtering & Parental Controls
Recent Blogs
  • AI Agent Risk Mitigation May 13, 2025
  • Elevate PDNS with Threat Intelligence Across the Stack April 30, 2025
  • How zvelo Solves the SaaS App Visibility Challenge April 9, 2025
  • Protective DNS: The Internet’s New Line of Defense April 2, 2025
Datasheets & Reports
  • Cost Analysis | zvelo Threat Intel vs OSINT
  • zveloCTI™ | Cyber Threat Intelligence
  • PhishBlocklist™ | Phishing Intelligence
  • PhishScan™ | Real-Time Phishing Threat Verification
  • Malicious Detailed Detection Feed™ | Malicious Intelligence
  • zveloDB™ | URL Database
  • zveloCAT™ | Real-Time Web Classification Engine
  • Report | Emotet’s Return Foreshadows Ransomware Surge
  • White Paper | 6 Steps to Drive Value from Cyber Threat Intelligence
Cyber Threat Definitions
Network Security, Cyber Threats, Malicious Definitions List
zvelo | We Categorize the Web® | Footer Logo

+1 (720) 897-8113
+1 (877) 77-zvelo (Toll Free)

zvelo US Headquarters Denver, Colorado USA

Contact Us
Products
  • zveloDB™ URL Database
  • zveloCAT™
  • Threat Intelligence
  • Phishing Intelligence
  • PhishScan™
  • SaaS App Intelligence
Use Cases
  • Web & DNS Filtering
  • (SASE) Secure Access Service Edge
  • (XDR) Extended Detection and Response
  • (DLP) Data Loss Prevention
  • (ZTNA) Zero Trust Network Access
  • (SPM) Security Posture Management
  • Secure Browsers
  • Human Risk Management
  • Threat Research
  • Brand Safety & Contextual Targeting
Resources
  • Blog, News & Press
  • Case Studies
  • zvelo’s Top SaaS Apps List
  • Datasheets, White Papers, & Reports
  • Videos, Webinars, & Virtual Events
  • Cyber Threat Definitions
Company
  • About zvelo
  • Contact Us
  • Careers at zvelo
  • Executive Leadership
  • Privacy
  • Legal
More

2025 zvelo, Inc. All rights reserved.

Go to Top