Skip to content
zvelo
We Categorize the Web®
zvelozvelo
  • Products
    • zveloDB™ URL Database
    • zveloCAT™ Real-Time URL Classifications
    • Threat Intelligence
    • Phishing Intelligence
    • SaaS App Intelligence
  • Use Cases
    • Web & DNS Filtering
    • (SASE) Secure Access Service Edge
    • (XDR) Extended Detection and Response
    • (DLP) Data Loss Prevention
    • (ZTNA) Zero Trust Network Access
    • (SPM) Security Posture Management
    • Secure Browsers
    • Human Risk Management
    • Threat Research
    • Brand Safety & Contextual Targeting
  • Resources
    • Blog, News & Press
    • Case Studies
    • zvelo’s Top SaaS Apps List
    • Datasheets, White Papers, & Reports
    • Videos, Webinars, & Virtual Events
  • Contact Us
Check a URL
  • Products
    • zveloDB™ URL Database
    • zveloCAT™
    • Threat Intelligence
    • Phishing Intelligence
    • SaaS App Intelligence
  • Use Cases
    • Web & DNS Filtering
    • (SASE) Secure Access Service Edge
    • (XDR) Extended Detection and Response
    • (DLP) Data Loss Prevention
    • (ZTNA) Zero Trust Network Access
    • (SPM) Security Posture Management
    • Secure Browsers
    • Human Risk Management
    • Threat Research
    • Brand Safety & Contextual Targeting
  • Resources 
    • Blog, News & Press
    • Case Studies
    • zvelo’s Top SaaS Apps List
    • Datasheets, White Papers, & Reports
    • Videos, Webinars, & Virtual Events
  • Contact Us
  • zveloLIVE

Tag Archives: Spear Phishing

You are here:
  1. Home
  2. Entries tagged with "Spear Phishing"

See How zvelo Security Intelligence Amplifies Phishing Detection

Powering Phishing Protection with Real-Time Intelligence

Cyber Threat Intelligence, Cybersecurity, Phishing DetectionBy zveloFebruary 13, 2025

Watch how zvelo enhances phishing protection solutions with real-time intelligence that helps block phishing attacks before harm occurs.

Deepfakes-Escalating-Threats-and-Countermeasures

Deepfakes: Escalating Threats and Countermeasures

Cybersecurity, Phishing Detection, Social EngineeringBy zveloApril 24, 2024

Explore the impact of generative AI on deepfakes, the escalating threats in cybersecurity, and mitigation tactics to combat AI-driven fraud.

protect-digital-assets-and-brand-identities-with-digital-risk-protection-services

Securing the Digital Frontier: The Role of Digital Risk Protection Services

Cyber Threat Intelligence, Cybersecurity, Phishing DetectionBy zveloNovember 30, 2023

Explore the role of Digital Risk Protection in defending against any unauthorized exploitation of brand assets in the digital realm.

ransomware

Ransomware: From Infection to Mitigation

Cybercrime, Cybersecurity, Phishing DetectionBy zveloAugust 29, 2023

Modern cyber risk management requires understanding ransomware. This post covers the basics from infiltration to extortion, as well as prevention and protection.

bumblebee-malware-delivered-via-wetransfer-and-smash-file-sharing-sites

Bumblebee Malware Distributed via WeTransfer or Smash

Cyber Threat Intelligence, Malicious Detection, Phishing Detection, Social EngineeringBy zveloFebruary 21, 2023

Threat Advisory: Attackers are using file-sharing services like Smash or WeTransfer to deliver Bumblebee malware disguised as RFPs.

spear-phishing-at-scale

Spear Phishing at Scale: AI-Fueled Social Engineering Attacks

Cybercrime, Cybersecurity, Phishing Detection, Social EngineeringBy zveloJanuary 31, 2023

Spear phishing at scale: A new era of AI fueled attacks where social engineering, social media, AI tools, and micro-targeting converge.

social-engineering-examples-using-linkedin-profile-attributes

Social Engineering Attack Examples

Cybercrime, Cybersecurity, Social EngineeringBy zveloJanuary 24, 2023

This post shares a few highly effective social engineering examples using micro-targeting techniques based on LinkedIn profile attributes.

profiling-social-engineering-attack-targets

Hacker Techniques: Profiling Social Engineering Attack Targets

Cybercrime, Cybersecurity, Social EngineeringBy zveloJanuary 17, 2023

From novice hackers to complex cybercriminal networks, see how attackers build detailed profiles of their social engineering attack targets.

phishing-trends-2020

Phishing Trends to Watch in 2020

Cybersecurity, Internet Safety & Privacy, Malicious Detection, Phishing Detection, Technology & InsightsBy zveloJanuary 29, 2020

Phishing remains a top cyber threat. Sophisticated scams are very easy to execute and highly profitable. Here are the top phishing trends in 2020 to watch.

2019 State of Phishing and What’s Next For Phishing Detection

AI & Machine Learning, Cybersecurity, Malicious Detection, Phishing DetectionBy zveloFebruary 5, 2019

Ransomware is so 2017. Today, targeted phishing poses the most significant risk. But how did we get here and what’s next for AI-based Phishing Detection.

→12→
zvelo | We Categorize the Web® | Footer Logo

+1 (720) 897-8113
+1 (877) 77-zvelo (Toll Free)

zvelo US Headquarters Denver, Colorado USA

Contact Us
Products
  • zveloDB™ URL Database
  • zveloCAT™
  • Threat Intelligence
  • Phishing Intelligence
  • PhishScan™
  • SaaS App Intelligence
Use Cases
  • Web & DNS Filtering
  • (SASE) Secure Access Service Edge
  • (XDR) Extended Detection and Response
  • (DLP) Data Loss Prevention
  • (ZTNA) Zero Trust Network Access
  • (SPM) Security Posture Management
  • Secure Browsers
  • Human Risk Management
  • Threat Research
  • Brand Safety & Contextual Targeting
Resources
  • Blog, News & Press
  • Case Studies
  • zvelo’s Top SaaS Apps List
  • Datasheets, White Papers, & Reports
  • Videos, Webinars, & Virtual Events
  • Cyber Threat Definitions
Company
  • About zvelo
  • Contact Us
  • Careers at zvelo
  • Executive Leadership
  • Privacy
  • Legal
More

2025 zvelo, Inc. All rights reserved.

Go to Top