Countdown to Zenith Live
In less than a week, some of the brightest minds in cloud computing, networking, and security will be gathering in Las Vegas for Zenith Live 2019, the Zscaler Cloud Summit. Are you ready? At Zenith...
View ArticleInnfiRAT: A new RAT aiming for your cryptocurrency and more
Recently, the Zscaler ThreatLabZ team came across a new RAT called InnfiRAT, which is written in .NET and designed to perform specific tasks from an infected machine. This blog provides an analysis of...
View ArticleWelcome to Zenith Live 2019!
What a morning! I stepped on stage at 8:00 a.m. to welcome over 700 people to this year’s Zscaler Cloud Summit, Zenith Live 2019. We’ve been planning for this event for the better part of a year and...
View ArticleNew Report from Gartner Research: The Future of Network Security Is in the Cloud
The IT networking world is evolving rapidly: The new universe of cloud and mobility can neither be built nor scaled on the network architectures of the past. Gartner Research VP analyst Lawrence Orans...
View ArticleReflections on Zenith Live Las Vegas
Zenith Live, the Zscaler Cloud Summit, is the highlight of the year for me. There’s nothing I enjoy more than meeting with customers and hearing first-hand their accounts of the challenges they face...
View ArticleIgnore DNS at your peril
DNS—the Domain Name System protocol—is known as the phone book for the internet. It’s what enables a person to type a familiar website address, such as zscaler.com, into a browser and have it...
View ArticlePhishing attacks abusing appspot.com and web.app domains on Google Cloud
In July, Zscaler ThreatLabZ posted a blog about a rise in the use of Microsoft Azure domains to host phishing attacks. Our researchers recently detected similar activity on the Google domains...
View ArticleMagecart hits again, leveraging compromised sites and newly registered domains
During alert monitoring, ThreatLabZ researchers came across multiple cases of shopping sites being compromised and injected with a skimming script. This injected script looks for the payment method and...
View ArticleEverything is Moving to the Cloud
In August 2019, Gartner published a report entitled “The Future of Network Security is in the Cloud.” The report offers a detailed and thorough explanation of why companies must recognize that their...
View ArticleWhy a holistic approach to cloud transformation is the key to success
This article originally appeared in CloudTech. As applications increasingly move to the cloud, businesses often voice concerns about soaring WAN costs as well as latency issues when accessing apps....
View ArticleExamining the Ryuk Ransomware
Ryuk ransomware had a disturbingly successful debut, being used to hit at least three organizations in its first two months of activity for more than $640,000 in ransom. Several attacks followed, where...
View ArticleWhy cybersecurity must be viewed as more than an IT issue
This article originally appeared in Digitalisation World. Cybersecurity will have to remain a priority for the foreseeable future. The truth is that data breaches are now an inevitability, which is...
View ArticleWhat makes Zscaler a great place to work?
Zscaler was born around a dining room table by our founder and a small, select team of technologists, and it’s grown into a company of more than 1,500 people worldwide. We’ve experienced a lot of...
View ArticleUC Browser app abuses may have exposed 500 million users
Recently, when examining the Zscaler cloud for unusual activity, ThreatLabZ researchers found some questionable hits in relation to a particular domain: 9appsdownloading[.]com. Upon analysis, we found...
View ArticleJoin me at the Gartner IT Symposium/Xpo
Zscaler was founded at a time when the use of cloud applications was emerging in the enterprise and users were becoming more mobile, connecting over unsecured networks and using unmanaged devices like...
View ArticleOctober: A Month of Wickedware
October is the perfect month for scary stories, with darkness falling early, howling autumn winds, and signs of Halloween everywhere. While ghost stories may frighten children, there are few things...
View ArticleThe Move to SD-WAN: Why Traditional Security Doesn’t Cut It
Is your company one of the thousands considering SD-WAN as part of its digital transformation? As companies across every industry move more of their vital infrastructure to the cloud, they recognize...
View ArticleSOX Doesn’t Mean Secure
This article originally ran in Forbes. The legislation was crafted with the best of intentions. Some 17 years ago, the U.S. federal government enacted the Sarbanes-Oxley Act to create better controls...
View ArticleZenith Live Lisbon: Empowering transformation and celebrating relationships
The Zenith Live Summit 2019 in Lisbon, Portugal, concluded a little less than a month ago, yet I am still buzzing with excitement and energy from this amazing event. It’s kind of appropriate that the...
View ArticleEmotet is back in action after a short break
It’s common for cybercriminals to launch an attack, then shortly thereafter stop the campaign before they are detected. These breaks also give these bad actors a chance to change tactics to, once...
View Article