Skip to content
zvelo
We Categorize the Web®
zvelozvelo
  • Products
    • zveloDB™ URL Database
    • zveloCAT™ Real-Time URL Classifications
    • Threat Intelligence
    • Phishing Intelligence
    • SaaS App Intelligence
  • Use Cases
    • Web & DNS Filtering
    • (SASE) Secure Access Service Edge
    • (XDR) Extended Detection and Response
    • (DLP) Data Loss Prevention
    • (ZTNA) Zero Trust Network Access
    • (SPM) Security Posture Management
    • Secure Browsers
    • Human Risk Management
    • Threat Research
    • Brand Safety & Contextual Targeting
  • Resources
    • Blog, News & Press
    • Case Studies
    • zvelo’s Top SaaS Apps List
    • Datasheets, White Papers, & Reports
    • Videos, Webinars, & Virtual Events
  • Contact Us
Check a URL
  • Products
    • zveloDB™ URL Database
    • zveloCAT™
    • Threat Intelligence
    • Phishing Intelligence
    • SaaS App Intelligence
  • Use Cases
    • Web & DNS Filtering
    • (SASE) Secure Access Service Edge
    • (XDR) Extended Detection and Response
    • (DLP) Data Loss Prevention
    • (ZTNA) Zero Trust Network Access
    • (SPM) Security Posture Management
    • Secure Browsers
    • Human Risk Management
    • Threat Research
    • Brand Safety & Contextual Targeting
  • Resources 
    • Blog, News & Press
    • Case Studies
    • zvelo’s Top SaaS Apps List
    • Datasheets, White Papers, & Reports
    • Videos, Webinars, & Virtual Events
  • Contact Us
  • zveloLIVE

You are here:
  1. Home
Social engineering tactics in ransomware distribution

Social Engineering Tactics in Ransomware Distribution

AI & Machine Learning, Cyber Threat Intelligence, CybersecurityBy zveloOctober 17, 2023

AI-fueled social engineering tactics are a potent initial infection vector for ransomware as well as a myriad of other cyber threats.

Details
Cyber Insurance Industry Tightens the Reins to Lower Cyber Risk

Cyber Insurance Tightens the Reins to Lower Risk

CybersecurityBy zveloOctober 10, 2023

Human error, lack of security protocols, and acts of war are now part of the cyber insurance exclusion criteria that could void your coverage.

Details
AI Isn't a Magic Wand: The Real Solution to Alert Fatigue

AI Isn’t a Magic Wand: The Real Solution to Alert Fatigue

AI & Machine Learning, Cyber Threat Intelligence, CybersecurityBy zveloOctober 2, 2023

AI isn’t a magic fix for alert fatigue. See what it really takes to slash false positives and solve the complexities of alert management.

Details
Defense-in-Depth-Layered-Strategy-for-Modern-Cybersecurity

Defense-in-Depth: A Layered Strategy for Modern Cybersecurity

Cyber Threat Intelligence, CybersecurityBy zveloSeptember 20, 2023

This post explores Defense-in-Depth, a comprehensive strategy with a multi-layered approach to modern threat protection.

Details
Threat Intelligence for Defense in Depth

Amplify Defense in Depth with High-Quality Threat Intelligence

Cyber Threat Intelligence, CybersecurityBy zveloSeptember 13, 2023

This post explores the integral role of threat intelligence in a Defense in Depth strategy and the necessity of high-quality threat data.

Details
The Criminal Elements of the Ransomware Ecosystem

The Criminal Elements of the Ransomware Ecosystem

Cybercrime, Cybersecurity, Malicious DetectionBy zveloSeptember 7, 2023

This post unpacks the criminal elements in the ransomware ecosystem: from developers and distributors to negotiators and even PR specialists.

Details
ransomware

Ransomware: From Infection to Mitigation

Cybercrime, Cybersecurity, Phishing DetectionBy zveloAugust 29, 2023

Modern cyber risk management requires understanding ransomware. This post covers the basics from infiltration to extortion, as well as prevention and protection.

Details
phishing-as-a-service

Phishing as a Service: From Click to Conquer

Cybercrime, Cybersecurity, Phishing DetectionBy zveloAugust 23, 2023

Phishing as a Service is a pervasive threat that has transformed phishing tools into commercial products made easily accessible to the masses.

Details
primary questions to answer during threat feed evaluation

Threat Feed Evaluations: Primary Questions to Answer

Cyber Threat Intelligence, CybersecurityBy zveloAugust 1, 2023

The third post in the threat feed evaluation series, this blog outlines the essential questions to address during the feed evaluation process.

Details
Top 3 Misconceptions When Evaluating zvelo Threat Feeds

Evaluating Threat Feeds: Top 3 Misconceptions

Cyber Threat Intelligence, Malicious Detection, Phishing DetectionBy zveloJuly 25, 2023

Part 2 in the series, this post addresses the most common misconceptions that can skew or misrepresent the results of a threat feed evaluation.

Details
←12345…
678910111213141516171819202122232425262728293031323334353637383940414243444546
47→
What Are You Looking For?
Browse By Category
  • Ad Tech & Brand Safety
  • AI & Machine Learning
  • Announcements, News & PR
  • Cybersecurity
  • Threat Intelligence
  • Internet Safety & Privacy
  • IoT Security Technology
  • Malicious Detection
  • Mobile & Subscriber Analytics
  • Phishing Detection
  • Technology & Insights
  • URL Database
  • Web Filtering & Parental Controls
Recent Blogs
  • AI Agent Risk Mitigation May 13, 2025
  • Elevate PDNS with Threat Intelligence Across the Stack April 30, 2025
  • How zvelo Solves the SaaS App Visibility Challenge April 9, 2025
  • Protective DNS: The Internet’s New Line of Defense April 2, 2025
Datasheets & Reports
  • Cost Analysis | zvelo Threat Intel vs OSINT
  • zveloCTI™ | Cyber Threat Intelligence
  • PhishBlocklist™ | Phishing Intelligence
  • PhishScan™ | Real-Time Phishing Threat Verification
  • Malicious Detailed Detection Feed™ | Malicious Intelligence
  • zveloDB™ | URL Database
  • zveloCAT™ | Real-Time Web Classification Engine
  • Report | Emotet’s Return Foreshadows Ransomware Surge
  • White Paper | 6 Steps to Drive Value from Cyber Threat Intelligence
Cyber Threat Definitions
Network Security, Cyber Threats, Malicious Definitions List
zvelo | We Categorize the Web® | Footer Logo

+1 (720) 897-8113
+1 (877) 77-zvelo (Toll Free)

zvelo US Headquarters Denver, Colorado USA

Contact Us
Products
  • zveloDB™ URL Database
  • zveloCAT™
  • Threat Intelligence
  • Phishing Intelligence
  • PhishScan™
  • SaaS App Intelligence
Use Cases
  • Web & DNS Filtering
  • (SASE) Secure Access Service Edge
  • (XDR) Extended Detection and Response
  • (DLP) Data Loss Prevention
  • (ZTNA) Zero Trust Network Access
  • (SPM) Security Posture Management
  • Secure Browsers
  • Human Risk Management
  • Threat Research
  • Brand Safety & Contextual Targeting
Resources
  • Blog, News & Press
  • Case Studies
  • zvelo’s Top SaaS Apps List
  • Datasheets, White Papers, & Reports
  • Videos, Webinars, & Virtual Events
  • Cyber Threat Definitions
Company
  • About zvelo
  • Contact Us
  • Careers at zvelo
  • Executive Leadership
  • Privacy
  • Legal
More

2025 zvelo, Inc. All rights reserved.

Go to Top