Skip to content
zvelo
We Categorize the Web®
zvelozvelo
  • Products
    • zveloDB™ URL Database
    • zveloCAT™ Real-Time URL Classifications
    • Threat Intelligence
    • Phishing Intelligence
    • SaaS App Intelligence
  • Use Cases
    • Web & DNS Filtering
    • (SASE) Secure Access Service Edge
    • (XDR) Extended Detection and Response
    • (DLP) Data Loss Prevention
    • (ZTNA) Zero Trust Network Access
    • (SPM) Security Posture Management
    • Secure Browsers
    • Human Risk Management
    • Threat Research
    • Brand Safety & Contextual Targeting
  • Resources
    • Blog, News & Press
    • Case Studies
    • zvelo’s Top SaaS Apps List
    • Datasheets, White Papers, & Reports
    • Videos, Webinars, & Virtual Events
  • Contact Us
Check a URL
  • Products
    • zveloDB™ URL Database
    • zveloCAT™
    • Threat Intelligence
    • Phishing Intelligence
    • SaaS App Intelligence
  • Use Cases
    • Web & DNS Filtering
    • (SASE) Secure Access Service Edge
    • (XDR) Extended Detection and Response
    • (DLP) Data Loss Prevention
    • (ZTNA) Zero Trust Network Access
    • (SPM) Security Posture Management
    • Secure Browsers
    • Human Risk Management
    • Threat Research
    • Brand Safety & Contextual Targeting
  • Resources 
    • Blog, News & Press
    • Case Studies
    • zvelo’s Top SaaS Apps List
    • Datasheets, White Papers, & Reports
    • Videos, Webinars, & Virtual Events
  • Contact Us
  • zveloLIVE

You are here:
  1. Home
key-considerations-for-evaluating-threat-feeds

Threat Feed Evaluations: Key Areas for Consideration

Cyber Threat Intelligence, Malicious Detection, Phishing DetectionBy zveloJuly 18, 2023

Part 1 in a series on how to evaluate threat feeds, this post focuses on the key areas to measure to help guide your decision making process.

Details
why-curated-threat-data-is-critical-to-actionable-threat-intelligence

Why Curated Threat Data is Critical to Effective Threat Protection

Cyber Threat Intelligence, CybersecurityBy zveloJune 28, 2023

Curated threat data delivers the true value of threat intelligence by offering the right data, accurately interpreted, and actionably presented.

Details
Curated Threat Intelligence vs Raw Threat Data

From Raw to Refined: 5 Reasons to Get Curated Threat Intel

Cyber Threat Intelligence, CybersecurityBy zveloJune 15, 2023

Explore the top 5 reasons why high-quality, curated threat intelligence data is superior to raw threat data for adequate threat protection.

Details
website-categorization-and-URL-classification-data-services

Harnessing the Power of Website Categorization

AI & Machine Learning, Content Categorization, URL Categorization DatabaseBy zveloJune 5, 2023

This article details the transformative and pivotal role of website categorization in shaping, enhancing, and protecting digital experiences.

Details
AI and Machine Learning in Cybersecurity

AI and Machine Learning in Cybersecurity

AI & Machine Learning, CybersecurityBy zveloMay 17, 2023

This post explores AI and Machine Learning for cybersecurity, including the various types, applications, challenges, and future potential.

Details
IPFS Phishing Attacks

IPFS Phishing Attacks

Cybercrime, Phishing DetectionBy zveloMay 4, 2023

Attackers have been quick to weaponize IPFS, expanding the threat landscape. Here’s what you need to know about recent IPFS phishing attacks.

Details
AI-powered-malware-a-black-ball-in-the-urn-of-creativity

AI-Powered Malware Holds Potential For Extreme Consequences

AI & Machine Learning, CybersecurityBy zveloApril 26, 2023

AI has undoubtedly benefited threat actors, but how close are we to a world where AI-powered malware can autonomously invade a network?

Details
Phishing-Detection

Phishing Detection in Depth

Cybersecurity, Phishing DetectionBy zveloApril 18, 2023

Discover the anatomy of phishing attacks, from social engineering to BEC, and learn how to defend your organization with the most effective phishing detection tools.

Details
Malicious Detection

Malicious Detection in Depth

Cyber Threat Intelligence, Cybersecurity, Malicious DetectionBy zveloMarch 29, 2023

Today’s threat actors are masters of evasion, constantly developing new versions of malware to outmaneuver cyber defenders and forging new paths to expand the threat landscape. As global cybercrime continues to escalate and plague both organizations and individuals, becoming the target of a cyber attack at one point or another is no longer a question…

Details
zvelo-cyber-threat-intelligence

Cyber Threat Intelligence

Cyber Threat Intelligence, CybersecurityBy zveloMarch 7, 2023

A comprehensive overview of cyber threat intelligence: What it is, how it’s used, the process lifecycle, use cases, and evaluation guidelines.

Details
←123456…
78910111213141516171819202122232425262728293031323334353637383940414243444546
47→
What Are You Looking For?
Browse By Category
  • Ad Tech & Brand Safety
  • AI & Machine Learning
  • Announcements, News & PR
  • Cybersecurity
  • Threat Intelligence
  • Internet Safety & Privacy
  • IoT Security Technology
  • Malicious Detection
  • Mobile & Subscriber Analytics
  • Phishing Detection
  • Technology & Insights
  • URL Database
  • Web Filtering & Parental Controls
Recent Blogs
  • AI Agent Risk Mitigation May 13, 2025
  • Elevate PDNS with Threat Intelligence Across the Stack April 30, 2025
  • How zvelo Solves the SaaS App Visibility Challenge April 9, 2025
  • Protective DNS: The Internet’s New Line of Defense April 2, 2025
Datasheets & Reports
  • Cost Analysis | zvelo Threat Intel vs OSINT
  • zveloCTI™ | Cyber Threat Intelligence
  • PhishBlocklist™ | Phishing Intelligence
  • PhishScan™ | Real-Time Phishing Threat Verification
  • Malicious Detailed Detection Feed™ | Malicious Intelligence
  • zveloDB™ | URL Database
  • zveloCAT™ | Real-Time Web Classification Engine
  • Report | Emotet’s Return Foreshadows Ransomware Surge
  • White Paper | 6 Steps to Drive Value from Cyber Threat Intelligence
Cyber Threat Definitions
Network Security, Cyber Threats, Malicious Definitions List
zvelo | We Categorize the Web® | Footer Logo

+1 (720) 897-8113
+1 (877) 77-zvelo (Toll Free)

zvelo US Headquarters Denver, Colorado USA

Contact Us
Products
  • zveloDB™ URL Database
  • zveloCAT™
  • Threat Intelligence
  • Phishing Intelligence
  • PhishScan™
  • SaaS App Intelligence
Use Cases
  • Web & DNS Filtering
  • (SASE) Secure Access Service Edge
  • (XDR) Extended Detection and Response
  • (DLP) Data Loss Prevention
  • (ZTNA) Zero Trust Network Access
  • (SPM) Security Posture Management
  • Secure Browsers
  • Human Risk Management
  • Threat Research
  • Brand Safety & Contextual Targeting
Resources
  • Blog, News & Press
  • Case Studies
  • zvelo’s Top SaaS Apps List
  • Datasheets, White Papers, & Reports
  • Videos, Webinars, & Virtual Events
  • Cyber Threat Definitions
Company
  • About zvelo
  • Contact Us
  • Careers at zvelo
  • Executive Leadership
  • Privacy
  • Legal
More

2025 zvelo, Inc. All rights reserved.

Go to Top