Skip to content
zvelo
We Categorize the Web®
zvelozvelo
  • Products
    • zveloDB™ URL Database
    • zveloCAT™ Real-Time URL Classifications
    • Threat Intelligence
    • Phishing Intelligence
    • SaaS App Intelligence
  • Use Cases
    • Web & DNS Filtering
    • (SASE) Secure Access Service Edge
    • (XDR) Extended Detection and Response
    • (DLP) Data Loss Prevention
    • (ZTNA) Zero Trust Network Access
    • (SPM) Security Posture Management
    • Secure Browsers
    • Human Risk Management
    • Threat Research
    • Brand Safety & Contextual Targeting
  • Resources
    • Blog, News & Press
    • Case Studies
    • zvelo’s Top SaaS Apps List
    • Datasheets, White Papers, & Reports
    • Videos, Webinars, & Virtual Events
  • Contact Us
Check a URL
  • Products
    • zveloDB™ URL Database
    • zveloCAT™
    • Threat Intelligence
    • Phishing Intelligence
    • SaaS App Intelligence
  • Use Cases
    • Web & DNS Filtering
    • (SASE) Secure Access Service Edge
    • (XDR) Extended Detection and Response
    • (DLP) Data Loss Prevention
    • (ZTNA) Zero Trust Network Access
    • (SPM) Security Posture Management
    • Secure Browsers
    • Human Risk Management
    • Threat Research
    • Brand Safety & Contextual Targeting
  • Resources 
    • Blog, News & Press
    • Case Studies
    • zvelo’s Top SaaS Apps List
    • Datasheets, White Papers, & Reports
    • Videos, Webinars, & Virtual Events
  • Contact Us
  • zveloLIVE

You are here:
  1. Home
What-to-do-if-you-are-a-victim-of-social-engineering

What to Do If You Are Victim of Social Engineering

Cybercrime, Cybersecurity, Social EngineeringBy zveloFebruary 28, 2023

This last post in our social engineering prevention series provides guidance on what to do if you fall victim to a social engineering attack.

Details
cybercrime-a-global-menace-with-no-boundaries

Cybercrime: A Comprehensive Overview

Cybercrime, CybersecurityBy zveloFebruary 23, 2023

This broad overview of cybercrime includes the main types of cybercrime, underlying motivations, societal impact, and tactics for prevention.

Details
Cyren-announces-liquidation-zvelo-url-database-premium-alternative

Cyren Announces Liquidation and Ceasing Operations

Announcements, News & PR, Cybersecurity, DNS Filtering, Malicious Detection, Phishing Detection, URL Database, Web Filtering & Parental ControlsBy zveloFebruary 22, 2023

Amid Cyren’s liquidation announcement, zvelo stands ready to provide a superior solution with minimal disruption to vendors and their users.

Details
bumblebee-malware-delivered-via-wetransfer-and-smash-file-sharing-sites

Bumblebee Malware Distributed via WeTransfer or Smash

Cyber Threat Intelligence, Malicious Detection, Phishing Detection, Social EngineeringBy zveloFebruary 21, 2023

Threat Advisory: Attackers are using file-sharing services like Smash or WeTransfer to deliver Bumblebee malware disguised as RFPs.

Details
social-engineering-countermeasures

Social Engineering Countermeasures: Don’t Be a Victim

Cybercrime, Cybersecurity, Phishing Detection, Social EngineeringBy zveloFebruary 13, 2023

This blog post offers social engineering countermeasures and provides guidance to minimize the risk of falling victim to these attacks.

Details
phishscan-real-time-phishing-threat-verification

zvelo Releases PhishScan for Real-Time Phishing Threat Verification

Announcements, News & PR, Cybersecurity, Phishing DetectionBy zveloFebruary 8, 2023

zvelo Releases PhishScan for Real-Time Phishing Threat Verification to Enhance Commercial Cybersecurity Solutions.

Details
cyren-announces-liquidation-zvelo-offers-seamless-url-database-alternative

Zvelo’s Seamless URL Database Solution for Cyren’s OEMs

Announcements, News & PR, DNS Filtering, URL Categorization Database, URL Database, Web Filtering & Parental ControlsBy zveloFebruary 3, 2023

For businesses in need of a reliable alternative to Cyren, zvelo provides a path to a superior solution with minimal disruption.

Details
spear-phishing-at-scale

Spear Phishing at Scale: AI-Fueled Social Engineering Attacks

Cybercrime, Cybersecurity, Phishing Detection, Social EngineeringBy zveloJanuary 31, 2023

Spear phishing at scale: A new era of AI fueled attacks where social engineering, social media, AI tools, and micro-targeting converge.

Details
social-engineering-examples-using-linkedin-profile-attributes

Social Engineering Attack Examples

Cybercrime, Cybersecurity, Social EngineeringBy zveloJanuary 24, 2023

This post shares a few highly effective social engineering examples using micro-targeting techniques based on LinkedIn profile attributes.

Details
profiling-social-engineering-attack-targets

Hacker Techniques: Profiling Social Engineering Attack Targets

Cybercrime, Cybersecurity, Social EngineeringBy zveloJanuary 17, 2023

From novice hackers to complex cybercriminal networks, see how attackers build detailed profiles of their social engineering attack targets.

Details
←1
2
…34567…
8910111213141516171819202122232425262728293031323334353637383940414243444546
47→
What Are You Looking For?
Browse By Category
  • Ad Tech & Brand Safety
  • AI & Machine Learning
  • Announcements, News & PR
  • Cybersecurity
  • Threat Intelligence
  • Internet Safety & Privacy
  • IoT Security Technology
  • Malicious Detection
  • Mobile & Subscriber Analytics
  • Phishing Detection
  • Technology & Insights
  • URL Database
  • Web Filtering & Parental Controls
Recent Blogs
  • AI Agent Risk Mitigation May 13, 2025
  • Elevate PDNS with Threat Intelligence Across the Stack April 30, 2025
  • How zvelo Solves the SaaS App Visibility Challenge April 9, 2025
  • Protective DNS: The Internet’s New Line of Defense April 2, 2025
Datasheets & Reports
  • Cost Analysis | zvelo Threat Intel vs OSINT
  • zveloCTI™ | Cyber Threat Intelligence
  • PhishBlocklist™ | Phishing Intelligence
  • PhishScan™ | Real-Time Phishing Threat Verification
  • Malicious Detailed Detection Feed™ | Malicious Intelligence
  • zveloDB™ | URL Database
  • zveloCAT™ | Real-Time Web Classification Engine
  • Report | Emotet’s Return Foreshadows Ransomware Surge
  • White Paper | 6 Steps to Drive Value from Cyber Threat Intelligence
Cyber Threat Definitions
Network Security, Cyber Threats, Malicious Definitions List
zvelo | We Categorize the Web® | Footer Logo

+1 (720) 897-8113
+1 (877) 77-zvelo (Toll Free)

zvelo US Headquarters Denver, Colorado USA

Contact Us
Products
  • zveloDB™ URL Database
  • zveloCAT™
  • Threat Intelligence
  • Phishing Intelligence
  • PhishScan™
  • SaaS App Intelligence
Use Cases
  • Web & DNS Filtering
  • (SASE) Secure Access Service Edge
  • (XDR) Extended Detection and Response
  • (DLP) Data Loss Prevention
  • (ZTNA) Zero Trust Network Access
  • (SPM) Security Posture Management
  • Secure Browsers
  • Human Risk Management
  • Threat Research
  • Brand Safety & Contextual Targeting
Resources
  • Blog, News & Press
  • Case Studies
  • zvelo’s Top SaaS Apps List
  • Datasheets, White Papers, & Reports
  • Videos, Webinars, & Virtual Events
  • Cyber Threat Definitions
Company
  • About zvelo
  • Contact Us
  • Careers at zvelo
  • Executive Leadership
  • Privacy
  • Legal
More

2025 zvelo, Inc. All rights reserved.

Go to Top