Malicious JavaScript injected into WordPress sites using the latest plugin...
WordPress is by far the most popular content management system (CMS) and, because of its wide usage, it is also popular among cybercriminals. Most of the WordPress sites that have been compromised are...
View ArticleTop exploit kit activity roundup – Spring 2019
This is the tenth in a series of quarterly roundups by the Zscaler ThreatLabZ research team in which we collect and analyze the activity of the top exploit kits over the last three months. Exploit kits...
View ArticleDon’t let Skype derail your Office 365 migration
What are the biggest concerns when considering an Office 365 migration? Generally, they’re centered around network performance and user experience. And those concerns are heightened when organizations...
View ArticleThe best route to the cloud: SD-WAN and cloud security
In the modern world, enterprises are entering a place where they have legitimate uses for all types of networks—private line, Ethernet, satellite, DSL, broadband, and so on. As a result, companies have...
View ArticleThe holistic approach to a successful cloud transformation
As applications move to the cloud, businesses often complain about skyrocketing WAN costs as well as latency issues when accessing apps. The much-anticipated benefits of a cloud transformation—greater...
View ArticleHow Zscaler leverages Google Cloud to deliver unprecedented security in real...
Cloud security is a complicated endeavor that requires different technologies to work together to attain the ultimate outcome: protecting today’s digital organizations. Platforms like Google Cloud can...
View ArticleThe great Office 365 migration: Are we there yet?
If you work in the U.S., you may well be using Office 365. As of 2019, more than 500,000 businesses in the U.S. alone use Office 365, including 70 percent of the Fortune 500. And adoption continues to...
View ArticleSDP, ZTNA, and CARTA: Making sense of the zero trust security buzz
SDP and ZTNA and CARTA. Oh my! Ok, so my ditty doesn’t have quite the same ring as the memorable song from The Wizard of Oz. But the anxiety exhibited in that refrain can certainly be applied to my...
View ArticleWhy SD-WAN requires you to rebalance your cybersecurity portfolio
SD-WAN is an exciting new technology that allows your organization to harness the speed, availability, and comparatively low costs of the internet to manage the lion’s share of your enterprise traffic....
View ArticleFelipe, a new infostealer Trojan
The Zscaler ThreatLabZ team came across a new strain of infostealer Trojan called Felipe, which silently installs itself onto a user’s system and connects to a command-and-control (C&C) server to...
View ArticleZero trust: ten years later. Is it time to think bigger?
As the concept of zero trust turns 10 years old, many of us in cybersecurity are asking two key questions: Why is zero trust popping up so much? Is zero trust something we believe we can implement?...
View ArticleThe Unintended Consequences Of Strong Encryption
This article originally appeared in Forbes. Secure sockets layer (SSL) is an industry-standard method for secure communications on the internet. SSL—along with its successor, transport layer security...
View ArticleTIC 3.0 Will Remove a Significant Cloud Barrier
The Office of Management and Budget (OMB) in coordination with the Department of Homeland Security (DHS) recently proposed an update to the Trusted Internet Connections (TIC) policy: TIC 3.0. Still in...
View ArticleZscaler Academy World Tour 2019 Wrap-up
My education didn’t end when I walked across the stage to receive my college diploma. It continues daily, as it does for just about everyone. You wouldn’t be where you are in your life and career...
View ArticleRansomware rakes in $1 million in a week
So many brilliant and outrageous news headlines start with the words “Florida man…” that it has officially become a meme. Here are a few zingers from the past week. Florida man reportedly breaks into...
View ArticleCloud security and the public sector: A dangerous partnership or a growing...
When it comes to making a move to the cloud, one of the biggest concerns is security. These concerns tend to be even greater among the public sector organisations, given the value and nature of the...
View ArticleWill “fake” clouds stall your enterprise cloud transformation?
This article originally appeared in Forbes. “The cloud? Sure, we're in the cloud. We ported our on-prem solution to a virtual machine.” Heard that from your network hardware vendor recently? Don't...
View ArticleMagecart activity and campaign enhancements
Magecart is a hacker group known for skimming credit or debit card details by injecting malicious JavaScript code into e-commerce sites. Back in September 2018, the Zscaler ThreatLabZ research team...
View ArticleHow SD-WAN will change your IT department
We’ve been covering SD-WAN extensively in blogs—this is the fourth in a recent series—and the theme that has run throughout them all is that SD-WAN has the potential to reshape the enterprise network....
View ArticleZero trust is shaking up VPN strategies.
The zero trust model has been developed because the distinction between “external” and “internal” areas of information systems has begun to blur. Private applications stand alongside their SaaS-based...
View Article