No Honor Among Thieves - Prynt Stealer’s Backdoor Exposed
Stealing information is fundamental to cybercriminals today to scope and gain access to systems, profile organizations, and execute bigger payday schemes like ransomware. Information stealer malware...
View Article6 Tips to Accelerate Integration of Newly Acquired Companies
At Mindbody, we’ve expanded locally and globally through acquisitions—11 to be precise, six of those in the past four years. Today, we provide 58,000 health and wellness businesses (gyms, salons, spas,...
View ArticleHow to Cut IT Cost and Complexity with a Zero Trust Architecture
From supply chain issues and inflation challenges to mere competitive pressures from other organizations, the last two years have highlighted the need for businesses to reduce their costs. These recent...
View ArticleThe Ares Banking Trojan Learns Old Tricks: Adds the Defunct Qakbot DGA
Summary: ThreatLabz observed an update to the Ares banking trojan that introduces a domain generation algorithm (DGA), which mirrors the Qakbot DGA. Based on analyzing the malware code, there does not...
View ArticleZero Trust for Federal Year-End Funds
The fiscal year end of the U.S. Federal government is weeks away, and with it the final push of spending to help agencies achieve their FY2022 goals. The FY2022 appropriations includes significant...
View ArticleZscaler is a 2022 Customers’ Choice in the Gartner® Peer Insights™ “Voice of...
We are excited to announce that Zscaler has been recognized as a Customers’ Choice vendor for 2022 in the Security Service Edge (SSE) category on Gartner® Peer Insights™. This distinction is a...
View ArticleWhy You Can’t Achieve Zero Trust with a Legacy Sandbox
Zero trust, it’s not just a buzzword anymore. In fact, zero trust is often part of a larger digital strategy to mitigate risks, increase resiliency, and secure access in today’s distributed environment...
View ArticleUsing CNAPP to Prioritize "Big Rocks" in Cloud Application Security
The late Stephen Covey is best known for his highly successful bestselling book, The 7 Habits of Highly Effective People. The habits in the book continue to have a profound impact on me, even 20 years...
View ArticleJoin Zscaler at CrowdStrike Fal.Con 2022
Zscaler is thrilled to be a Diamond Sponsor at CrowdStrike Fal.Con 2022, coming up September 19–21 in Las Vegas. This year at Fal.Con, you’ll have the opportunity to be among the first to hear about...
View ArticleNew Learning Experiences to Drive Success - September 2022
I am a firm believer that Zscaler enables companies to complete their secure digital transformation journey and achieve enterprise-wide zero trust. We’ve built the best in the business, no question...
View ArticleZoom Outage Detected By Zscaler Digital Experience (ZDX)
Zscaler Digital Experience detects outage At 7:55 AM PDT on September 15, 2022, Zscaler’s Digital Experience (ZDX) saw a substantial, unexpected drop in the ZDX score for Zoom services across the...
View ArticleKey Requirements for Monitoring Networks Within Secure Global Organizations
The shift to cloud applications and increase in mobility initiatives improves remote workforce productivity. However, to simplify end user access, network teams are constantly under pressure to design...
View ArticleUnderstanding the Root Cause of Common Problems With Your Microsoft Teams Call
The pandemic has triggered many organizations to reevaluate whether employees will return to the office or stay remote. According to a Forbes article, a study by IWG (known for Regus flexible...
View ArticleTechnical Analysis of Crytox Ransomware
Key points Crytox is a ransomware family consisting of several stages of encrypted code that was first observed in 2020 The ransomware encrypts local disks and network drives and leaves a ransom note...
View ArticleZero Trust for Healthcare
Cybersecurity has become a strategic imperative for healthcare organizations. Data breaches increased 650% in 2021 and the associated costs increased 29.5%. The rising adoption of telehealth, a mobile...
View ArticleAgent Tesla RAT Delivered by Quantum Builder With New TTPs
Zscaler ThreatLabz has observed a campaign that delivers Agent Tesla, a .NET based keylogger and remote access trojan (RAT) active since 2014, using a builder named “Quantum Builder” sold on the dark...
View ArticleThe Results Are in: VPNs Are Downright Dangerous
What’s keeping security professionals up at night these days? The answer may surprise you. Today, a new survey [the second annual] conducted by Cybersecurity Insiders and commissioned by Zscaler found...
View ArticleHow Zero Trust Can Accelerate Time to Value in Mergers and Acquisitions
The success of mergers and acquisitions (M&A) hinges on many factors, key amongst them successful integrations. In this, merging IT infrastructures is often a challenge but it is one that must...
View ArticleA Cloud Platform is Greater Than the Sum of Its Parts During an M&A Transaction
Nothing exposes the challenges of complex IT infrastructures quite like mergers and acquisitions (M&A). Converging networks, data, applications, and user access controls takes time, is...
View ArticleWait a Minute! There's More Than One Type of (Security) Sandbox?
Not every day can be a beach day. Instead of driving hours to build sandcastles, why not bring the beach to you? In a very literal sense, sandboxes are isolated structures with sand that emulate the...
View Article