Skip to content
zvelo
We Categorize the Web®
zvelozvelo
  • Products
    • zveloDB™ URL Database
    • zveloCAT™ Real-Time URL Classifications
    • Threat Intelligence
    • Phishing Intelligence
    • SaaS App Intelligence
  • Use Cases
    • Web & DNS Filtering
    • (SASE) Secure Access Service Edge
    • (XDR) Extended Detection and Response
    • (DLP) Data Loss Prevention
    • (ZTNA) Zero Trust Network Access
    • (SPM) Security Posture Management
    • Secure Browsers
    • Human Risk Management
    • Threat Research
    • Brand Safety & Contextual Targeting
  • Resources
    • Blog, News & Press
    • Case Studies
    • zvelo’s Top SaaS Apps List
    • Datasheets, White Papers, & Reports
    • Videos, Webinars, & Virtual Events
  • Contact Us
Check a URL
  • Products
    • zveloDB™ URL Database
    • zveloCAT™
    • Threat Intelligence
    • Phishing Intelligence
    • SaaS App Intelligence
  • Use Cases
    • Web & DNS Filtering
    • (SASE) Secure Access Service Edge
    • (XDR) Extended Detection and Response
    • (DLP) Data Loss Prevention
    • (ZTNA) Zero Trust Network Access
    • (SPM) Security Posture Management
    • Secure Browsers
    • Human Risk Management
    • Threat Research
    • Brand Safety & Contextual Targeting
  • Resources 
    • Blog, News & Press
    • Case Studies
    • zvelo’s Top SaaS Apps List
    • Datasheets, White Papers, & Reports
    • Videos, Webinars, & Virtual Events
  • Contact Us
  • zveloLIVE

You are here:
  1. Home
unpatched-vulnerabilities-lessons-learned-from-wannacry

Unpatched Vulnerabilities – Lessons Learned from WannaCry

Botnet Detection, Cybersecurity, Information Security, Internet Safety & Privacy, Malicious Detection, Network Security, URL Database, Web Filtering & Parental ControlsBy zveloOctober 11, 2019

Unpatched vulnerabilities cause one third of breaches. 34% of all vulnerabilities reported so far this remain unpatched. How are you mitigating your risks?

Details
critical-policies-for-digital-security

Top 5 Critical Security Policies to Enforce

Cybersecurity, DNS Filtering, Information Security, Internet Safety & Privacy, Network Security, Technology & Insights, Web Filtering & Parental ControlsBy zveloOctober 10, 2019

Implementing critical security policies is one thing, but enforcing them is an uphill battle. Here are 5 security battles worth fighting to enforce.

Details
trends-in-cybercrime-diversified-targets

Cybercrime Trends 2019

Cybercrime, CybersecurityBy zveloOctober 9, 2019

The emerging cybercrime trend of diversifying attack targets demonstrates how criminals are increasingly able to detect and exploit new vulnerabilities.

Details
the-dark-side-of-encryption

The Dark Side of Encryption

Internet Safety & Privacy, Technology & InsightsBy zveloOctober 8, 2019

Increased encryption is drawing scrutiny as it disables organizations that work to filter and block imagery showing the sexual abuse of children.

Details
privacy-vs-security-conundrum

The Privacy vs Security Conundrum

Cybersecurity, Internet Safety & Privacy, Technology & InsightsBy zveloOctober 7, 2019

Today’s world of hyperconnectivity positions privacy vs security as one of the most fiercely contested global debates. Can you have both without compromise?

Details
securing your email - tips for web mail alternatives

Securing Your Email – Tips for Web Mail Alternatives

CybersecurityBy zveloOctober 4, 2019

When it comes to web mail alternatives for securing your email, here are a few “go-to” services combining rich user experiences and no-nonsense security.

Details
the-cost-of-a-data-breach

The Cost of a Data Breach: What’s Really at Stake?

Cybersecurity, Malicious Detection, Phishing Detection, Technology & InsightsBy zveloOctober 3, 2019

The cost of a data breach goes well beyond remediation and recovery. Know your risks. Go below the surface layer to assess what’s actually at stake.

Details
key-steps-to-fortify-defenses-against-phishing

Fortify Your Defenses Against Phishing Attacks

Cybersecurity, Phishing Detection, Technology & InsightsBy zveloOctober 2, 2019

Phishing attacks increasingly focus on people because the human layer is easily exploited. Here are 3 ways to fortify your defenses against phishing.

Details
actionable-steps-to-combat-phishing

Actionable Steps to Combat Phishing

Cybersecurity, Phishing Detection, Technology & InsightsBy zveloOctober 1, 2019

Read the top actionable steps you can take to combat phishing attacks. Cybersecurity Awareness Month is the perfect time to take action with 3 key things you can start doing right now.

Details
Unsafe, Banned and Counterfeit Products on the Rise

Unsafe, Banned and Counterfeit Products on the Rise Through Online Retailers

Internet Safety & Privacy, Technology & Insights, URL DatabaseBy zveloSeptember 25, 2019

Unsafe and counterfeit products sold by third party sellers via eCommerce platforms are on the rise, increasing profits at the expense of consumer safety.

Details
←1
2345678910111213
…1415161718…
19202122232425262728293031323334353637383940414243444546
47→
What Are You Looking For?
Browse By Category
  • Ad Tech & Brand Safety
  • AI & Machine Learning
  • Announcements, News & PR
  • Cybersecurity
  • Threat Intelligence
  • Internet Safety & Privacy
  • IoT Security Technology
  • Malicious Detection
  • Mobile & Subscriber Analytics
  • Phishing Detection
  • Technology & Insights
  • URL Database
  • Web Filtering & Parental Controls
Recent Blogs
  • AI Agent Risk Mitigation May 13, 2025
  • Elevate PDNS with Threat Intelligence Across the Stack April 30, 2025
  • How zvelo Solves the SaaS App Visibility Challenge April 9, 2025
  • Protective DNS: The Internet’s New Line of Defense April 2, 2025
Datasheets & Reports
  • Cost Analysis | zvelo Threat Intel vs OSINT
  • zveloCTI™ | Cyber Threat Intelligence
  • PhishBlocklist™ | Phishing Intelligence
  • PhishScan™ | Real-Time Phishing Threat Verification
  • Malicious Detailed Detection Feed™ | Malicious Intelligence
  • zveloDB™ | URL Database
  • zveloCAT™ | Real-Time Web Classification Engine
  • Report | Emotet’s Return Foreshadows Ransomware Surge
  • White Paper | 6 Steps to Drive Value from Cyber Threat Intelligence
Cyber Threat Definitions
Network Security, Cyber Threats, Malicious Definitions List
zvelo | We Categorize the Web® | Footer Logo

+1 (720) 897-8113
+1 (877) 77-zvelo (Toll Free)

zvelo US Headquarters Denver, Colorado USA

Contact Us
Products
  • zveloDB™ URL Database
  • zveloCAT™
  • Threat Intelligence
  • Phishing Intelligence
  • PhishScan™
  • SaaS App Intelligence
Use Cases
  • Web & DNS Filtering
  • (SASE) Secure Access Service Edge
  • (XDR) Extended Detection and Response
  • (DLP) Data Loss Prevention
  • (ZTNA) Zero Trust Network Access
  • (SPM) Security Posture Management
  • Secure Browsers
  • Human Risk Management
  • Threat Research
  • Brand Safety & Contextual Targeting
Resources
  • Blog, News & Press
  • Case Studies
  • zvelo’s Top SaaS Apps List
  • Datasheets, White Papers, & Reports
  • Videos, Webinars, & Virtual Events
  • Cyber Threat Definitions
Company
  • About zvelo
  • Contact Us
  • Careers at zvelo
  • Executive Leadership
  • Privacy
  • Legal
More

2025 zvelo, Inc. All rights reserved.

Go to Top