Skip to content
zvelo
We Categorize the Web®
zvelozvelo
  • Products
    • zveloDB™ URL Database
    • zveloCAT™ Real-Time URL Classifications
    • zveloCTI™ Cyber Threat Intelligence
    • PhishBlocklist™ Phishing Intelligence
    • PhishScan™ Phishing Threat Verification
    • Malicious Detailed Detection Feed™ Malicious Intelligence
  • Use Cases
    • (DRPS) Digital Risk Protection Services
    • (XDR) Extended Detection and Response
    • (SASE) Secure Access Service Edge
    • (MSSPs) Managed Security Service Providers
    • (OT) Operational Technology Security
    • Threat Research
    • Web & DNS Filtering
    • Brand Safety & Contextual Targeting
  • Resources
    • Blog, News & Press
    • Case Studies
    • Datasheets, White Papers, & Reports
    • Videos, Webinars, & Virtual Events
  • Contact Us
Check a URL
  • Products
    • zveloDB™ URL Database
    • zveloCAT™
    • zveloCTI™ Cyber Threat Intelligence
    • PhishBlocklist™ | Phishing Intelligence
    • PhishScan™ Phishing Threat Verification
    • Malicious Detailed Detection Feed™
  • Use Cases
    • (DRPS) Digital Risk Protection Services
    • (XDR) Extended Detection and Response
    • (SASE) Secure Access Service Edge
    • (MSSPs) Managed Security Service Providers
    • (OT) Operational Technology Security
    • Threat Research
    • Web & DNS Filtering
    • Brand Safety & Contextual Targeting
  • Resources 
    • Blog, News & Press
    • Case Studies
    • Datasheets, White Papers, & Reports
    • Videos, Webinars, & Virtual Events
  • Contact Us
  • zveloLIVE

Tag Archives: Malicious Payload

You are here:
  1. Home
  2. Entries tagged with "Malicious Payload"

What-to-do-if-you-are-a-victim-of-social-engineering

What to Do If You Are Victim of Social Engineering

Cybercrime, Cybersecurity, Social EngineeringBy zveloFebruary 28, 2023

This last post in our social engineering prevention series provides guidance on what to do if you fall victim to a social engineering attack.

Honeypots-baiting-attackers-uncovering-malicious-payloads-coinmining

Baiting Attackers to Identify Malicious Payloads Like CoinMiners

Cyber Threat Intelligence, Cybersecurity, Malicious Detection, Network SecurityBy zveloAugust 2, 2022

This post illustrates how you can leverage the threat intel from honeypots to identify malicious payloads like CoinMiners to block cryptojacking attempts.

Thousands of Legitimate Websites Compromised

Cybersecurity, Malicious DetectionBy zveloJuly 19, 2010

zveloLABS™ has detected a new widespread compromise, with tens of thousands of domains infected.  Cybercriminals have used stolen credentials, placing specially crafted pages into legitimate websites that lead visitors to malicious payloads.

zvelo | We Categorize the Web® | Footer Logo

+1 (720) 897-8113
+1 (877) 77-zvelo (Toll Free)

zvelo US Headquarters Denver, Colorado USA

Contact Us
Products
  • zveloDB™ URL Database
  • zveloCAT™
  • zveloCTI™ Cyber Threat Intelligence
  • Malicious Detailed Detection Feed™
  • PhishBlocklist™
  • PhishScan™
Use Cases
  • (DRPS) Digital Risk Protection Services
  • (XDR) Extended Detection and Response
  • (SASE) Secure Access Service Edge
  • (MSSPs) Managed Security Service Providers
  • (OT) Operational Technology Security
  • Threat Research
  • Web & DNS Filtering
  • Brand Safety & Contextual Targeting
Resources
  • Blog, News & Press
  • Case Studies
  • Datasheets, White Papers, & Reports
  • Videos, Webinars, & Virtual Events
  • Cyber Threat Definitions
Company
  • About zvelo
  • Contact Us
  • Careers at zvelo
  • Executive Leadership
  • Privacy
  • Legal
More

2023 zvelo, Inc. All rights reserved.

Go to Top