Building a Safer Internet For All Through Best-In-Class Cyber Threat Intelligence and URL Classification Data Services

Thank for visiting the zvelo resource page for videos, webinars, and virtual events.  We invite you to browse, read, share and download any of the useful assets and information we post here.

Understanding the CTI Process

Presentation from RMISC Virtual Event, June 8-10, 2021

During this 40 minute presentation, Brad Rhodes, Head of Cybersecurity at zvelo, discusses the Cyber Threat Intelligence (CTI) Process, explaining what it is, who uses it, how it’s used, use case scenarios and why it’s important to organizations both large and small.

Mobile Forensic Investigations

#Forensic #HappyHour with @MarioSamolis is all about #salty #cybersecurity and of course #beer #malware #threathunting​. 

A Dash of Cyber...

A Dash of Cyber…

Hosted by Ron Craig, and featuring Alexandre BLANC, Rod Lewis and zvelo’s own Brad Rhodes.  This 30 minute session is a discussion on how to close the gaps on visibility so you can make better informed decisions to lower risk. Watch the video.


Current Cyber Threats & Impact of Solar Winds

From tools of the trade, to attack surfaces & vectors, to current cyber threats, to the impact of Solar Winds — this presentation is packed with valuable insights for defenders.  Watch Now.

Combating Online Influence and Manipulation

This video presentation from the Cybersecurity and Infrastructure Security Agency (CISA) offers valuable insight around combating online influence and manipulation from malicious threat actors.

Emotet:  An In-Depth Document Analysis

The video provides a practical defender’s perspective of Emotet’s initial infection mechanisms and how understanding them can better protect your organization.

zvelo and Coronavirus:  ProActive Research and Trends

This video presentation from zvelo’s cybersecurity team shares data insights and emerging trends in observed potentially malicious online behavior around the Coronavirus pandemic — geographical naming, redirection to potentially malicious content, domain ages, and malicious traffic via third parties.

Netgear Vulnerability Exploit Demonstration Video

Once you see this vulnerability in action you can easily see how this exploit can be used to create havoc. If someone does take control of your router, they can easily infect or target other IoT devices.

Adventures in Buying Internet Traffic

Mark Ryan Talabis, Chief Security Scientist at zvelo, dives into processes and implications of buying internet traffic, along with ways the industry can combat this problem.