Learn about the CTI Collection and Processing stages of the feedback loop and how zvelo leverages each stage for Cyber Threat Intelligence.| zvelo
AI has undoubtedly benefited threat actors, but how close are we to a world where AI-powered malware can autonomously invade a network?| zvelo
This article details the transformative and pivotal role of website categorization in shaping, enhancing, and protecting digital experiences.| zvelo
OSINT vs Commercial Threat Intelligence - A high level overview weighing the pros and cons for each type of threat feed.| zvelo
Understanding how malicious and phishing threat data gets curated is crucial to assessing the value of curated cyber threat intelligence.| zvelo
This broad overview of cybercrime includes the main types of cybercrime, underlying motivations, societal impact, and tactics for prevention.| zvelo
This post explores malicious detection in depth including the types of threats, use cases, common tools and methodologies used for detection.| zvelo
DNS Filtering has become the 'table-stakes' starting point for powering the DNS-Layer Security piece of the SASE cybersecurity framework.| zvelo
A comprehensive overview of cyber threat intelligence: what it is, how it's used, the process lifecycle, use cases, and evaluation guidelines.| zvelo
Social engineering attacks are a type of cybercrime that human weakness by using psychological manipulation to trick individuals.| zvelo
Discover the anatomy of phishing attacks, and how to improve your defenses with the right phishing detection tools for the many attack types.| zvelo