Malware Leveraging XML-RPC Vulnerability to Exploit WordPress Sites
We have written a number of blogs about vulnerabilities within and attacks on sites built with WordPress. And, when you consider that 34 percent of all websites in the world are built with WordPress,...
View ArticleJoker Playing Hide-and-Seek with Google Play
Joker is one of the most prominent malware families that continually targets Android devices. Despite awareness of this particular malware, it keeps finding its way into Google’s official application...
View ArticleTargeted Attacks on Oil and Gas Supply Chain Industries in the Middle East
Cybercriminals are known to look to current events to make their schemes and campaigns more engaging and relevant to unsuspecting victims. These events don't need to be global in nature, and are often...
View ArticleSpear Phishing Campaign Delivers Buer and Bazar Malware
Zscaler ThreatLabZ became aware of a prevalent phishing campaign targeting employees of various organizations. During the past couple of weeks, many enterprise users have been getting spear phishing...
View ArticleWhen Technology isn’t the Problem: The Psychology of IT Transformation
This post was originally published on LinkedIn on September 16, 2020 Enterprises transform network architectures to become more agile and better able to meet business goals. But transitioning your...
View ArticleZero Trust, Microsegmentation, and Cloud Security
The benefits of the cloud are seemingly endless. You can access it from anywhere, scalability is infinite, and any changes that you make are applied everywhere, instantaneously. But migrating to the...
View ArticleZscaler is an Innovator Sponsor at the ONUG Fall 2020 Virtual Conference
The way employees work has changed dramatically in the past year as the world has had to quickly adopt work-from-home technologies for the sake of user productivity and business operations. While this...
View Articleゼットスケーラージャパンで働く、セールスチームの原 嘉紀のインタビュー
ゼットスケーラーは、6大陸に渡る150以上のデータセンターを介して、世界最大規模のクラウドセキュリティプラットフォームを提供しています。Forbesグローバル2000に選出された400社を超える企業を始め、多くのお客様のクラウドトランスフォーメーションを実現しています。...
View ArticleRansomware’s Pivot: A Business School Case Study
There are very few technology companies that successfully pivot their business strategy to adapt to a macro paradigm shift. A classic case study in adapting to changing market conditions is the Netflix...
View ArticleMeet Zscaler: From Sales to Enablement - How Megan Allen Found Her Passion
Though Megan Allen’s enthusiasm for sales may have started at age five, she wasn’t afraid to pursue a new career direction at Zscaler. Enablement and helping others is where she finds her passion. In...
View ArticleSix Steps for Effective Public-Sector Cloud Adoption in a Post-COVID World
Throughout Australia and New Zealand, governments and public-sector bodies are facing significant challenges caused by the rapid impact of technology. New work patterns are replacing those that have...
View ArticleZPA and CrowdStrike: What This New Device Health Integration Means for You
Summary: Zscaler and CrowdStrike announced a new device health integration Device health score will be used to automatically update ZPA access policies Joint customers of ZPA and CrowdStrike ZTA can...
View ArticleA Crowning Achievement: Cyber Security Essentials Certification in the UK
The National Cyber Security Centre (NCSC) is on a mission to make the UK the safest place to live and work online. I’m excited to say that Zscaler has joined the NCSC’s effort by attaining the...
View ArticleZenith Live 2020: Beyond the Limits of Legacy Thinking
This post also appeared on LinkedIn on October 17, 2020. The way the world works has changed. And so has the way we put on conferences. In the last two years, I've had the great privilege to meet and...
View ArticleMeasuring Your Attackable Threat Surface With the Zscaler Internet Attack...
This was originally published on LinkedIn on October 13, 2020, Did you leave the window open? Lock the door? The invitations to cyberattacks are there. And bad actors can see them. But can you? Few...
View ArticleIdentity-Based Microsegmentation is Foundational to Cloud Security: Don’t Get...
Identity-based microsegmentation has rapidly become accepted as a best practice for cloud security and enabling zero trust. In Gartner’s April 2020 report, Market Guide for Cloud Workload Protection...
View ArticleThe Formula for Flawless Data Protection
Your data is under attack. That statement shouldn’t take anyone by surprise. But do you have the right data protection platform in place to keep your data safe? Judging by recent news reports and...
View ArticleVPNs: The Biggest Threat to Your Industrial Control System
Is zero trust access the answer to the growing problem of VPN access to industrial control systems? I think so, and I’m not the only one. What makes VPNs dangerous Virtual private networks (VPNs) are...
View ArticleThe Formula for Flawless Data Protection
Your data is under attack. That statement shouldn’t take anyone by surprise. But do you have the right data protection platform in place to keep your data safe? Judging by recent news reports and...
View ArticleAPT-31 Leverages COVID-19 Vaccine Theme and Abuses Legitimate Online Services
Recently, Zscaler's ThreatLabZ team discovered several malicious MSI installer binaries that were hosted on attacker-controlled GitHub accounts and distributed in-the-wild in August 2020. These MSI...
View Article