Skip to content
zvelo
We Categorize the Web®
zvelozvelo
  • Products
    • zveloDB™ URL Database
    • zveloCAT™ Real-Time URL Classifications
    • Threat Intelligence
    • Phishing Intelligence
    • SaaS App Intelligence
  • Use Cases
    • Web & DNS Filtering
    • (SASE) Secure Access Service Edge
    • (XDR) Extended Detection and Response
    • (DLP) Data Loss Prevention
    • (ZTNA) Zero Trust Network Access
    • (SPM) Security Posture Management
    • Secure Browsers
    • Human Risk Management
    • Threat Research
    • Brand Safety & Contextual Targeting
  • Resources
    • Blog, News & Press
    • Case Studies
    • zvelo’s Top SaaS Apps List
    • Datasheets, White Papers, & Reports
    • Videos, Webinars, & Virtual Events
  • Contact Us
Check a URL
  • Products
    • zveloDB™ URL Database
    • zveloCAT™
    • Threat Intelligence
    • Phishing Intelligence
    • SaaS App Intelligence
  • Use Cases
    • Web & DNS Filtering
    • (SASE) Secure Access Service Edge
    • (XDR) Extended Detection and Response
    • (DLP) Data Loss Prevention
    • (ZTNA) Zero Trust Network Access
    • (SPM) Security Posture Management
    • Secure Browsers
    • Human Risk Management
    • Threat Research
    • Brand Safety & Contextual Targeting
  • Resources 
    • Blog, News & Press
    • Case Studies
    • zvelo’s Top SaaS Apps List
    • Datasheets, White Papers, & Reports
    • Videos, Webinars, & Virtual Events
  • Contact Us
  • zveloLIVE

You are here:
  1. Home
cyber-threat-intelligence-cti-analysis-dissemination-feedback

CTI: Analysis, Dissemination, and Feedback

Cyber Threat Intelligence, Cybersecurity, Malicious Detection, Phishing DetectionBy zveloOctober 19, 2020

Completing the CTI Process Loop blog series, this post focuses on the last three stages of the CTI Loop: Analysis, Dissemination & Feedback.

Details
malicious-trends-report-zvelo-cyber-threat-intelligence-october-2020

zvelo Releases Malicious Trends Report

Announcements, News & PR, Cyber Threat Intelligence, Cybersecurity, Information Security, Malicious Detection, Network Security, Technology & InsightsBy zveloOctober 8, 2020

zvelo releases its first Cyber Threat Intelligence Malicious Trends Report for insights into current threats and exploits on the ActiveWeb.

Details
new-domain-registrations-deciphering-threat-signals

Deciphering Threat Signals: New Domain Registrations

Cyber Threat Intelligence, Cybersecurity, Malicious Detection, Phishing DetectionBy zveloSeptember 9, 2020

Beyond the malicious and phishing activities of the ActiveWeb, lurks suspicious activity with new domain registrations in the ProActiveWeb.

Details
CTI-collection-and-processing

CTI: Collection and Processing

Cyber Threat Intelligence, Cybersecurity, Malicious DetectionBy zveloAugust 28, 2020

Learn about the CTI Collection and Processing stages of the feedback loop and how zvelo leverages each stage for Cyber Threat Intelligence.

Details
black-hat-2020-zvelo-cybersecurity-insights

Black Hat 2020: zvelo Cybersecurity Observations

CybersecurityBy zveloAugust 17, 2020

Black Hat 2020, emphasizing an aim to undermine the legitimacy of the upcoming US elections, observations from zvelo’s Cybersecurity Team.

Details
Network Security, Cyber Threats, Malicious Definitions List

Network Security, Malicious Threats, and Common Computer Definitions

Cybersecurity, Malicious Detection, Phishing DetectionBy zveloAugust 14, 2020

We’ve put together this glossary of cyber threat definitions as a resource for you in your quest to help make the internet a safer place for all!

Details
DGAs-domain-generation-algorithms-what-you-need-to-know-about-malicious-detection

Domain Generation Algorithms (DGAs)

Cyber Threat Intelligence, Cybersecurity, Information Security, Malicious Detection, Network SecurityBy zveloAugust 11, 2020

Domain Generation Algorithms (DGAs) are a key tool for threat actors.  As DGAs become more sophisticated and increasingly difficult to detect, zvelo’s Cybersecurity Team recommends heightened awareness and shares what you need to know.

Details
zvelo-CTI-Cyber-Threat-Intelligence

Cyber Threat Intelligence (CTI): Planning and Direction

Cyber Threat Intelligence, Cybersecurity, Information Security, Malicious Detection, Network Security, Phishing Detection, Technology & InsightsBy zveloAugust 6, 2020

zvelo’s Cybersecurity Team shares how you can use Cyber Threat Intelligence (CTI) to successfully deliver actionable intelligence to support executive decision making which protects your Operating Environment (EO).

Details
TTP-threat-intelligence-living-off-the-land-at-scale-LOTLS

TTP: Living Off The Land at Scale

Cyber Threat Intelligence, Cybersecurity, Internet Safety & Privacy, Phishing DetectionBy zveloJuly 24, 2020

From a threat intelligence perspective, this post presents the Tactic, Technique and Procedure (TTP), which can be best described as Living Off The Land at Scale (LOTLS).

Details
phishing attack topologies

Phishing Attack Topologies

Cyber Threat Intelligence, Cybersecurity, Phishing DetectionBy zveloJuly 22, 2020

Phishing threats are not homogeneous in nature. Malicious actors use several different phishing attack topologies to execute their campaigns – each of which require a different approach to detect and mitigate the threat.

Details
←1
23456789
…1011121314…
1516171819202122232425262728293031323334353637383940414243444546
47→
What Are You Looking For?
Browse By Category
  • Ad Tech & Brand Safety
  • AI & Machine Learning
  • Announcements, News & PR
  • Cybersecurity
  • Threat Intelligence
  • Internet Safety & Privacy
  • IoT Security Technology
  • Malicious Detection
  • Mobile & Subscriber Analytics
  • Phishing Detection
  • Technology & Insights
  • URL Database
  • Web Filtering & Parental Controls
Recent Blogs
  • Addressing Legacy Phishing Detection Failure July 15, 2025
  • AI Agent Risk Mitigation May 13, 2025
  • Elevate PDNS with Threat Intelligence Across the Stack April 30, 2025
  • How zvelo Solves the SaaS App Visibility Challenge April 9, 2025
Datasheets & Reports
  • Cost Analysis | zvelo Threat Intel vs OSINT
  • zveloCTI™ | Cyber Threat Intelligence
  • PhishBlocklist™ | Phishing Intelligence
  • PhishScan™ | Real-Time Phishing Threat Verification
  • Malicious Detailed Detection Feed™ | Malicious Intelligence
  • zveloDB™ | URL Database
  • zveloCAT™ | Real-Time Web Classification Engine
  • Report | Emotet’s Return Foreshadows Ransomware Surge
  • White Paper | 6 Steps to Drive Value from Cyber Threat Intelligence
Cyber Threat Definitions
Network Security, Cyber Threats, Malicious Definitions List
zvelo | We Categorize the Web® | Footer Logo

+1 (720) 897-8113
+1 (877) 77-zvelo (Toll Free)

zvelo US Headquarters Denver, Colorado USA

Contact Us
Products
  • zveloDB™ URL Database
  • zveloCAT™
  • Threat Intelligence
  • Phishing Intelligence
  • PhishScan™
  • SaaS App Intelligence
Use Cases
  • Web & DNS Filtering
  • (SASE) Secure Access Service Edge
  • (XDR) Extended Detection and Response
  • (DLP) Data Loss Prevention
  • (ZTNA) Zero Trust Network Access
  • (SPM) Security Posture Management
  • Secure Browsers
  • Human Risk Management
  • Threat Research
  • Brand Safety & Contextual Targeting
Resources
  • Blog, News & Press
  • Case Studies
  • zvelo’s Top SaaS Apps List
  • Datasheets, White Papers, & Reports
  • Videos, Webinars, & Virtual Events
  • Cyber Threat Definitions
Company
  • About zvelo
  • Contact Us
  • Careers at zvelo
  • Executive Leadership
  • Privacy
  • Legal
More

2025 zvelo, Inc. All rights reserved.

Go to Top