A practical example into the understanding of Emotet's initial infection mechanisms to better protect your organization.| zvelo
Learn how Protective DNS blocks threats at the domain level—and how zvelo's URL Database powers vendors with real-time domain intelligence.| zvelo
In this post, we take a step back and cover the basics—the individual structural elements of a full path URL (Uniform Resource Locator).| zvelo
From a threat intelligence perspective, this post presents the TTP which can be best described as Living Off The Land at Scale (LOTLS).| zvelo
Explore the key distinctions of base domain vs full-path URLs and their impact on network security and URL categorization applications.| zvelo
Malicious Detailed Detection Feed delivers curated data + metadata to identify, confirm, and enrich intelligence on malicious IOCs| zvelo