Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

FakeClicky Activity: Skimmers Hit Again

Zscaler ThreatLabz team monitors different skimmer groups and recently we have seen a spike in the use of the FakeClicky skimmer loader to steal payment details from e-commerce websites. This skimmer...

View Article


The Evolution of CASB: Where It’s Been and Where It’s Going

Today, cloud access security brokers (CASBs) are go-to tools for securing data in the cloud, and have proven to be indispensable for organizations that are looking to safely embrace the use of SaaS...

View Article


Scammer luring Apple enthusiasts on launch event

We often see scammers luring victims by taking advantage of hype related to events or game launches. We observed a similar tactic during the iPhone 13 launch event. Due to the COVID-19 pandemic, this...

View Article

Leveraging Zero Trust for Multicloud Networking

The vast majority of organizations—92 percent according to one recent study—now use, or intend to use, multiple cloud providers. How they arrived there varies. Some organizations developed a...

View Article

Siemens and Zscaler Partner to Extend Zero Trust Security to the Industrial...

Zscaler is proud to announce a new strategic partnership with Siemens, the global powerhouse in industrial automation and digitalization, to address emerging cyber threats posed to industrial...

View Article


Women Making an Impact: Pratima Rao Gluckman on Overcoming Obstacles in Tech

This year, at the annual Zscaler Sales Kickoff (SKO) in August, we were joined by powerful and inspiring women who shared their stories of setbacks, persistence, and triumphs. Supported by the WIZE...

View Article

Squirrelwaffle: New Loader Delivering Cobalt Strike

Zscaler ThreatLabz has been following an emerging new malware loader known as Squirrelwaffle that is being used to deliver Cobalt Strike. In this blog, we will be analyzing the complete attack chain...

View Article

The Challenges and Benefits of Identity and Access Management in Governing...

We have seen a dramatic increase in the number of organizations experiencing data breaches in the cloud space – and the majority of those breaches had something to do with identities and their related...

View Article


Rightsizing Your Zero Trust Microsegmentation Plan

In recent months, we’ve talked a lot about segmentation and microsegmentation (see list of some posts below) and why segmentation is necessary to prevent data and application compromise. In this post,...

View Article


Office Optional, Zero Trust Required

Are we at the beginning of the end yet? As the post-pandemic world gets tantalizingly closer, some companies have begun setting plans in motion to bring employees back to the office while others have...

View Article

The Zscaler Data Protection Tour: How to Respond to Shadow IT

In this blog series, we are taking our readers on a tour of various challenges to enterprise data security. As we do so, we will detail the ins and outs of each subject, describe why they matter when...

View Article

Five Tips for Improving Your Cloud Security Posture with CSPM

The cloud is a great place to innovate. But managing the security risk, sensitive data, access to data, and compliance of your complex cloud-based environment can be very challenging. Today, many CISOs...

View Article

New Trickbot and BazarLoader campaigns use multiple delivery vectors

The Zscaler ThreatLabz research team monitors thousands of files daily tracking new and pervasive threats, including one of the most prominent banking trojans of the last five years: Trickbot. Trickbot...

View Article


Zscaler Internet Access (ZIA) and CrowdStrike: Zero Trust Access Control...

The rise in mobile work is dissolving the traditional security perimeter, and the best way to secure this “new normal” is by adopting a zero trust model. Zero trust is often also called perimeter-less...

View Article

“We can’t hear you!” Diagnose Poor Call Quality Issues with Digital...

The most dreaded call that someone working the IT help desk can receive is from a user complaining about poor call quality. These user experience problems are typically highly visible, disruptive, and...

View Article


Climb Into the Driver's Seat: Accelerating Transformation to Zero Trust

Over the last several years, business has been cruising toward digital transformation. But the global pandemic slammed the foot on the accelerator for the majority of businesses around the world....

View Article

Using Microsegmentation to Live Long and Prosper

A new age of space exploration is on the horizon. From formal space research conducted by the International Space Station, satellites, and NASA to recreational jaunts into zero gravity by Captain Kirk,...

View Article


How Identity-Based Zero Trust Can Prevent a Python Backdoor Attack

Scripting attacks are emerging as a primary vector for cybercriminals. In fact, in the U.S., scripting attacks have become almost as common as malware, and, in EMEA, scripting accounts for by far the...

View Article

The White House Is Focused on Cybersecurity. What Can We Change Together?

As we observe Cybersecurity Awareness Month 2021, we are looking at a very different threat landscape – and new opportunities to fight those threats. President Biden recently met with the CEOs of major...

View Article

AtomSilo Ransomware Enters the League of Double Extortion

Ransomware is used widely in cyberattacks to disrupt the victim's organization. Over the last two years, many attackers have evolved their ransomware tactics to include data exfiltration. This tactic...

View Article
Browsing all 1471 articles
Browse latest View live