Skip to content
zvelo
We Categorize the Web®
zvelozvelo
  • Products
    • zveloDB™ URL Database
    • zveloCAT™ Real-Time URL Classifications
    • Threat Intelligence
    • Phishing Intelligence
    • SaaS App Intelligence
  • Use Cases
    • Web & DNS Filtering
    • (SASE) Secure Access Service Edge
    • (XDR) Extended Detection and Response
    • (DLP) Data Loss Prevention
    • (ZTNA) Zero Trust Network Access
    • (SPM) Security Posture Management
    • Secure Browsers
    • Human Risk Management
    • Threat Research
    • Brand Safety & Contextual Targeting
  • Resources
    • Blog, News & Press
    • Case Studies
    • zvelo’s Top SaaS Apps List
    • Datasheets, White Papers, & Reports
    • Videos, Webinars, & Virtual Events
  • Contact Us
Check a URL
  • Products
    • zveloDB™ URL Database
    • zveloCAT™
    • Threat Intelligence
    • Phishing Intelligence
    • SaaS App Intelligence
  • Use Cases
    • Web & DNS Filtering
    • (SASE) Secure Access Service Edge
    • (XDR) Extended Detection and Response
    • (DLP) Data Loss Prevention
    • (ZTNA) Zero Trust Network Access
    • (SPM) Security Posture Management
    • Secure Browsers
    • Human Risk Management
    • Threat Research
    • Brand Safety & Contextual Targeting
  • Resources 
    • Blog, News & Press
    • Case Studies
    • zvelo’s Top SaaS Apps List
    • Datasheets, White Papers, & Reports
    • Videos, Webinars, & Virtual Events
  • Contact Us
  • zveloLIVE

You are here:
  1. Home
malicious-trends-report-zvelo-cyber-threat-intelligence-october-2020

zvelo Releases Malicious Trends Report

Announcements, News & PR, Cyber Threat Intelligence, Cybersecurity, Information Security, Malicious Detection, Network Security, Technology & InsightsBy zveloOctober 8, 2020

zvelo releases its first Cyber Threat Intelligence Malicious Trends Report for insights into current threats and exploits on the ActiveWeb.

Details
new-domain-registrations-deciphering-threat-signals

Deciphering Threat Signals: New Domain Registrations

Cyber Threat Intelligence, Cybersecurity, Malicious Detection, Phishing DetectionBy zveloSeptember 9, 2020

Beyond the malicious and phishing activities of the ActiveWeb, lurks suspicious activity with new domain registrations in the ProActiveWeb.

Details
CTI-collection-and-processing

CTI: Collection and Processing

Cyber Threat Intelligence, Cybersecurity, Malicious DetectionBy zveloAugust 28, 2020

Learn about the CTI Collection and Processing stages of the feedback loop and how zvelo leverages each stage for Cyber Threat Intelligence.

Details
black-hat-2020-zvelo-cybersecurity-insights

Black Hat 2020: zvelo Cybersecurity Observations

CybersecurityBy zveloAugust 17, 2020

Black Hat 2020, emphasizing an aim to undermine the legitimacy of the upcoming US elections, observations from zvelo’s Cybersecurity Team.

Details
Network Security, Cyber Threats, Malicious Definitions List

Network Security, Malicious Threats, and Common Computer Definitions

Cybersecurity, Malicious Detection, Phishing DetectionBy zveloAugust 14, 2020

We’ve put together this glossary of cyber threat definitions as a resource for you in your quest to help make the internet a safer place for all!

Details
DGAs-domain-generation-algorithms-what-you-need-to-know-about-malicious-detection

Domain Generation Algorithms (DGAs)

Cyber Threat Intelligence, Cybersecurity, Information Security, Malicious Detection, Network SecurityBy zveloAugust 11, 2020

Domain Generation Algorithms (DGAs) are a key tool for threat actors.  As DGAs become more sophisticated and increasingly difficult to detect, zvelo’s Cybersecurity Team recommends heightened awareness and shares what you need to know.

Details
zvelo-CTI-Cyber-Threat-Intelligence

Cyber Threat Intelligence (CTI): Planning and Direction

Cyber Threat Intelligence, Cybersecurity, Information Security, Malicious Detection, Network Security, Phishing Detection, Technology & InsightsBy zveloAugust 6, 2020

zvelo’s Cybersecurity Team shares how you can use Cyber Threat Intelligence (CTI) to successfully deliver actionable intelligence to support executive decision making which protects your Operating Environment (EO).

Details
TTP-threat-intelligence-living-off-the-land-at-scale-LOTLS

TTP: Living Off The Land at Scale

Cyber Threat Intelligence, Cybersecurity, Internet Safety & Privacy, Phishing DetectionBy zveloJuly 24, 2020

From a threat intelligence perspective, this post presents the Tactic, Technique and Procedure (TTP), which can be best described as Living Off The Land at Scale (LOTLS).

Details
phishing attack topologies

Phishing Attack Topologies

Cyber Threat Intelligence, Cybersecurity, Phishing DetectionBy zveloJuly 22, 2020

Phishing threats are not homogeneous in nature. Malicious actors use several different phishing attack topologies to execute their campaigns – each of which require a different approach to detect and mitigate the threat.

Details
secure-web-gateway-next-generation-vpn-alternative

Secure Web Gateways

Information Security, Internet Safety & Privacy, Network Security, Technology & InsightsBy zveloJuly 16, 2020

Driven by the spike in remote access demand due to the global pandemic, organizations now face an urgent need to shift from legacy VPNs to Secure Web Gateways in order to support a modern, cloud-based architecture.

Details
←1
23456789
…1011121314…
1516171819202122232425262728293031323334353637383940414243444546
47→
What Are You Looking For?
Browse By Category
  • Ad Tech & Brand Safety
  • AI & Machine Learning
  • Announcements, News & PR
  • Cybersecurity
  • Threat Intelligence
  • Internet Safety & Privacy
  • IoT Security Technology
  • Malicious Detection
  • Mobile & Subscriber Analytics
  • Phishing Detection
  • Technology & Insights
  • URL Database
  • Web Filtering & Parental Controls
Recent Blogs
  • AI Agent Risk Mitigation May 13, 2025
  • Elevate PDNS with Threat Intelligence Across the Stack April 30, 2025
  • How zvelo Solves the SaaS App Visibility Challenge April 9, 2025
  • Protective DNS: The Internet’s New Line of Defense April 2, 2025
Datasheets & Reports
  • Cost Analysis | zvelo Threat Intel vs OSINT
  • zveloCTI™ | Cyber Threat Intelligence
  • PhishBlocklist™ | Phishing Intelligence
  • PhishScan™ | Real-Time Phishing Threat Verification
  • Malicious Detailed Detection Feed™ | Malicious Intelligence
  • zveloDB™ | URL Database
  • zveloCAT™ | Real-Time Web Classification Engine
  • Report | Emotet’s Return Foreshadows Ransomware Surge
  • White Paper | 6 Steps to Drive Value from Cyber Threat Intelligence
Cyber Threat Definitions
Network Security, Cyber Threats, Malicious Definitions List
zvelo | We Categorize the Web® | Footer Logo

+1 (720) 897-8113
+1 (877) 77-zvelo (Toll Free)

zvelo US Headquarters Denver, Colorado USA

Contact Us
Products
  • zveloDB™ URL Database
  • zveloCAT™
  • Threat Intelligence
  • Phishing Intelligence
  • PhishScan™
  • SaaS App Intelligence
Use Cases
  • Web & DNS Filtering
  • (SASE) Secure Access Service Edge
  • (XDR) Extended Detection and Response
  • (DLP) Data Loss Prevention
  • (ZTNA) Zero Trust Network Access
  • (SPM) Security Posture Management
  • Secure Browsers
  • Human Risk Management
  • Threat Research
  • Brand Safety & Contextual Targeting
Resources
  • Blog, News & Press
  • Case Studies
  • zvelo’s Top SaaS Apps List
  • Datasheets, White Papers, & Reports
  • Videos, Webinars, & Virtual Events
  • Cyber Threat Definitions
Company
  • About zvelo
  • Contact Us
  • Careers at zvelo
  • Executive Leadership
  • Privacy
  • Legal
More

2025 zvelo, Inc. All rights reserved.

Go to Top