FakeClicky Activity: Skimmers Hit Again
Zscaler ThreatLabz team monitors different skimmer groups and recently we have seen a spike in the use of the FakeClicky skimmer loader to steal payment details from e-commerce websites. This skimmer...
View ArticleThe Evolution of CASB: Where It’s Been and Where It’s Going
Today, cloud access security brokers (CASBs) are go-to tools for securing data in the cloud, and have proven to be indispensable for organizations that are looking to safely embrace the use of SaaS...
View ArticleScammer luring Apple enthusiasts on launch event
We often see scammers luring victims by taking advantage of hype related to events or game launches. We observed a similar tactic during the iPhone 13 launch event. Due to the COVID-19 pandemic, this...
View ArticleLeveraging Zero Trust for Multicloud Networking
The vast majority of organizations—92 percent according to one recent study—now use, or intend to use, multiple cloud providers. How they arrived there varies. Some organizations developed a...
View ArticleSiemens and Zscaler Partner to Extend Zero Trust Security to the Industrial...
Zscaler is proud to announce a new strategic partnership with Siemens, the global powerhouse in industrial automation and digitalization, to address emerging cyber threats posed to industrial...
View ArticleWomen Making an Impact: Pratima Rao Gluckman on Overcoming Obstacles in Tech
This year, at the annual Zscaler Sales Kickoff (SKO) in August, we were joined by powerful and inspiring women who shared their stories of setbacks, persistence, and triumphs. Supported by the WIZE...
View ArticleSquirrelwaffle: New Loader Delivering Cobalt Strike
Zscaler ThreatLabz has been following an emerging new malware loader known as Squirrelwaffle that is being used to deliver Cobalt Strike. In this blog, we will be analyzing the complete attack chain...
View ArticleThe Challenges and Benefits of Identity and Access Management in Governing...
We have seen a dramatic increase in the number of organizations experiencing data breaches in the cloud space – and the majority of those breaches had something to do with identities and their related...
View ArticleRightsizing Your Zero Trust Microsegmentation Plan
In recent months, we’ve talked a lot about segmentation and microsegmentation (see list of some posts below) and why segmentation is necessary to prevent data and application compromise. In this post,...
View ArticleOffice Optional, Zero Trust Required
Are we at the beginning of the end yet? As the post-pandemic world gets tantalizingly closer, some companies have begun setting plans in motion to bring employees back to the office while others have...
View ArticleThe Zscaler Data Protection Tour: How to Respond to Shadow IT
In this blog series, we are taking our readers on a tour of various challenges to enterprise data security. As we do so, we will detail the ins and outs of each subject, describe why they matter when...
View ArticleFive Tips for Improving Your Cloud Security Posture with CSPM
The cloud is a great place to innovate. But managing the security risk, sensitive data, access to data, and compliance of your complex cloud-based environment can be very challenging. Today, many CISOs...
View ArticleNew Trickbot and BazarLoader campaigns use multiple delivery vectors
The Zscaler ThreatLabz research team monitors thousands of files daily tracking new and pervasive threats, including one of the most prominent banking trojans of the last five years: Trickbot. Trickbot...
View ArticleZscaler Internet Access (ZIA) and CrowdStrike: Zero Trust Access Control...
The rise in mobile work is dissolving the traditional security perimeter, and the best way to secure this “new normal” is by adopting a zero trust model. Zero trust is often also called perimeter-less...
View Article“We can’t hear you!” Diagnose Poor Call Quality Issues with Digital...
The most dreaded call that someone working the IT help desk can receive is from a user complaining about poor call quality. These user experience problems are typically highly visible, disruptive, and...
View ArticleClimb Into the Driver's Seat: Accelerating Transformation to Zero Trust
Over the last several years, business has been cruising toward digital transformation. But the global pandemic slammed the foot on the accelerator for the majority of businesses around the world....
View ArticleUsing Microsegmentation to Live Long and Prosper
A new age of space exploration is on the horizon. From formal space research conducted by the International Space Station, satellites, and NASA to recreational jaunts into zero gravity by Captain Kirk,...
View ArticleHow Identity-Based Zero Trust Can Prevent a Python Backdoor Attack
Scripting attacks are emerging as a primary vector for cybercriminals. In fact, in the U.S., scripting attacks have become almost as common as malware, and, in EMEA, scripting accounts for by far the...
View ArticleThe White House Is Focused on Cybersecurity. What Can We Change Together?
As we observe Cybersecurity Awareness Month 2021, we are looking at a very different threat landscape – and new opportunities to fight those threats. President Biden recently met with the CEOs of major...
View ArticleAtomSilo Ransomware Enters the League of Double Extortion
Ransomware is used widely in cyberattacks to disrupt the victim's organization. Over the last two years, many attackers have evolved their ransomware tactics to include data exfiltration. This tactic...
View Article