Threat Advisory: Attackers are using file-sharing services like Smash or WeTransfer to deliver Bumblebee malware disguised as RFPs.| zvelo
Learn about zvelo's unique hybrid approach to web content categorization and malicious detection. With over 20 years of experience and partnerships with some of the world's leading anti-virus, MSSPs, and communications companies—zvelo's next-generation approach achieves industry-leading coverage and accuracy for end users worldwide.| zvelo
The latest string of attacks using Qakbot malware are breaching networks and successfully deploying ransomware in less than half a day.| zvelo
This post explores AI and Machine Learning for cybersecurity, including the various types, applications, challenges, and future potential.| zvelo
In this post, we take a step back and cover the basics—the individual structural elements of a full path URL (Uniform Resource Locator).| zvelo
This article details the transformative and pivotal role of website categorization in shaping, enhancing, and protecting digital experiences.| zvelo
When it comes to malicious vs objectionable sites, these are the distinctions between malicious site content and objectionable site content.| zvelo
Explore the key distinctions of base domain vs full-path URLs and their impact on network security and URL categorization applications.| zvelo
OSINT vs Commercial Threat Intelligence - A high level overview weighing the pros and cons for each type of threat feed.| zvelo
Understanding how malicious and phishing threat data gets curated is crucial to assessing the value of curated cyber threat intelligence.| zvelo
As we explore the critical role of data in powering the SASE solutions suite, this post focuses on the Firewall-as-a-Service.| zvelo
DNS Filtering has become the 'table-stakes' starting point for powering the DNS-Layer Security piece of the SASE cybersecurity framework.| zvelo
A comprehensive overview of cyber threat intelligence: what it is, how it's used, the process lifecycle, use cases, and evaluation guidelines.| zvelo
Secure Web Gateways complement DNS Filtering to deliver the minimum level of threat protection capabilities required in a SASE framework.| zvelo
DNS Filtering and SWGs can offer core security functionality but the SASE framework requires CASBs to extend threat protection to cloud apps.| zvelo
Polyfill.io supply-chain attack key details. See how zvelo protects clients from malicious redirects plus action items to safeguard your site.| zvelo
This post explores Defense-in-Depth, a comprehensive strategy with a multi-layered approach to modern threat protection.| zvelo