The map below shows a sampling of currently identified malicious threats with the choice to toggle between recent detections and a density heatmap of malicious detections.
The information represented in this global cyber threat map is for demonstration purposes and does not encompass the entirety of zvelo Malicious Detection capabilities.Contact Us About Integrating Our Malicious Detection for Network Security OEMs
Detections: This map references a random, daily sampling of zvelo malicious categorizations and plots them based on the GPS coordinates of the threat. Detection information consists of the malicious category, obfuscated IP of the threat, and location of threat.
Heatmap: This map provides a high-level summation of the areas where zvelo has recently encountered the most malicious threats. Red indicates a higher density, while blue denotes a lower number of occurrences.
Real-time identification of IPs and URLs related to malware, viruses, and other forms of harmful programs enables you avoid potential harm to your system by being able to block traffic to/from those destinations. A coveted Malicious Detection solution allows for easy integration through an API or data feed for use with routers, proxies, firewalls, or other systems for a safer Internet.Learn More About Our Malicious Detection for Network Security OEMs
zvelo Malicious Categories
The detection systems offered by zvelo utilize the following nine types of Malicious Categories:
- Web pages impersonating other web pages with the intention of stealing passwords, credit card numbers, or other information. Also web pages that are part of scams such as a “”419″” scam where a person pays a sum of money with the expectation of a larger payback that never comes. Examples con, hoax, scam, etc.
- Spam URLs
- URLs that frequently occur in spam messages.
- Spyware and Questionable Software
- In the case of spyware or keystroke loggers, software reports information to a central server. Defined as questionable software, some people may object to having on their system, however the software may have a legitimate purpose.
- A botnet is a group of bots banded together or compromised machines running software used by hackers to send phishing attacks, denial of service attacks (DDoS) or spam.
- Command and Control Centers
- With command and control centers, internet servers are used to send commands to infected machines named bots.
- Compromised and Links To Malware
- Compromised web pages are disguised as legitimate, but really house malicious code or link to malicious websites hosting malware. Someone other than the owner has compromised these sites. In the instance that Firefox blocks a site as malicious, this category is used. Examples include defaced, hacked by, etc.
- Malware Call-Home
- When spyware and viruses check a URL for updates or report information back to a particular URL, this is labelled as a malware call-home address.
- Malware Distribution Point
- Web pages that host exploits, viruses, and/or other malware are considered Malware Distribution Points. This category is used by web analysts if their anti-virus program triggers on a particular website.
- Ad Fraud
- Websites that are being used to commit fraudulent online display advertising transactions using different ad impression boosting techniques including but not limited to the following: ads stacking, iframe stuffing, and hidden ads. Sites that have high non-human web traffic (NHT) and with rapid, large, and experience unexplained changes in traffic.
These nine types of malicious detection may appear on this global cyber threat map. Other audiences may refer to this visualization as an internet attack map.
Enabling web filtering and parental controls vendors with premium web content categorization malicious detection, performance, coverage, accuracy, through a customizable and easy-to-integrate API, combined with the industry’s best customer service and responsiveness.Learn More About our Parental Controls / Web Filtering Solution