This article series examines phishing attacks that faded from popularity but are now resurging — in particular, malicious Office documents.| zvelo
This post explores AI and Machine Learning for cybersecurity, including the various types, applications, challenges, and future potential.| zvelo
In this post, we take a step back and cover the basics—the individual structural elements of a full path URL (Uniform Resource Locator).| zvelo
Watch how zvelo enhances phishing protection solutions with real-time intelligence that helps block phishing attacks before harm occurs.| zvelo
This article details the transformative and pivotal role of website categorization in shaping, enhancing, and protecting digital experiences.| zvelo
Explore the key distinctions of base domain vs full-path URLs and their impact on network security and URL categorization applications.| zvelo
Understanding how malicious and phishing threat data gets curated is crucial to assessing the value of curated cyber threat intelligence.| zvelo
This post explores malicious detection in depth including the types of threats, use cases, common tools and methodologies used for detection.| zvelo
DNS Filtering has become the 'table-stakes' starting point for powering the DNS-Layer Security piece of the SASE cybersecurity framework.| zvelo
zvelo takes you behind the scenes of a phishing attack to show you the TTPs attackers use to gain network access and establish persistence.| zvelo
A curated threat intelligence approach, in which aging data is managed based on current attack status, is crucial to preventing cybercrime.| zvelo
Phishing as a Service is a pervasive threat that has transformed phishing tools into commercial products made easily accessible to the masses| zvelo
Attackers are using sophisticated TTPs like Adversary-in-the-Middle (AiTM) phishing attacks to steal session cookies and bypass MFA security.| zvelo
Advanced strategies to defend against Tycoon 2FA phishing kits that bypass MFA to harvest session cookies and exploit user accounts.| zvelo
To combat Generative AI phishing attacks, phishing training programs must prioritize technical aspects of detection over grammatical errors.| zvelo
This blog explores the realm of dark Large Language Models (LLMs) and their role in revolutionizing cyberattacks.| zvelo
Explore the role of Digital Risk Protection in defending against any unauthorized exploitation of brand assets in the digital realm.| zvelo
This post explores Defense-in-Depth, a comprehensive strategy with a multi-layered approach to modern threat protection.| zvelo
Modern cyber risk management requires understanding ransomware. This post covers the basics from infiltration to extortion, plus prevention.| zvelo