Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

No Honor Among Thieves - Prynt Stealer’s Backdoor Exposed

Stealing information is fundamental to cybercriminals today to scope and gain access to systems, profile organizations, and execute bigger payday schemes like ransomware. Information stealer malware...

View Article


6 Tips to Accelerate Integration of Newly Acquired Companies

At Mindbody, we’ve expanded locally and globally through acquisitions—11 to be precise, six of those in the past four years. Today, we provide 58,000 health and wellness businesses (gyms, salons, spas,...

View Article


How to Cut IT Cost and Complexity with a Zero Trust Architecture

From supply chain issues and inflation challenges to mere competitive pressures from other organizations, the last two years have highlighted the need for businesses to reduce their costs. These recent...

View Article

The Ares Banking Trojan Learns Old Tricks: Adds the Defunct Qakbot DGA

Summary: ThreatLabz observed an update to the Ares banking trojan that introduces a domain generation algorithm (DGA), which mirrors the Qakbot DGA. Based on analyzing the malware code, there does not...

View Article

Zero Trust for Federal Year-End Funds

The fiscal year end of the U.S. Federal government is weeks away, and with it the final push of spending to help agencies achieve their FY2022 goals. The FY2022 appropriations includes significant...

View Article


Zscaler is a 2022 Customers’ Choice in the Gartner® Peer Insights™ “Voice of...

We are excited to announce that Zscaler has been recognized as a Customers’ Choice vendor for 2022 in the Security Service Edge (SSE) category on Gartner® Peer Insights™. This distinction is a...

View Article

Why You Can’t Achieve Zero Trust with a Legacy Sandbox

Zero trust, it’s not just a buzzword anymore. In fact, zero trust is often part of a larger digital strategy to mitigate risks, increase resiliency, and secure access in today’s distributed environment...

View Article

Using CNAPP to Prioritize "Big Rocks" in Cloud Application Security

The late Stephen Covey is best known for his highly successful bestselling book, The 7 Habits of Highly Effective People. The habits in the book continue to have a profound impact on me, even 20 years...

View Article


Join Zscaler at CrowdStrike Fal.Con 2022

Zscaler is thrilled to be a Diamond Sponsor at CrowdStrike Fal.Con 2022, coming up September 19–21 in Las Vegas. This year at Fal.Con, you’ll have the opportunity to be among the first to hear about...

View Article


New Learning Experiences to Drive Success - September 2022

I am a firm believer that Zscaler enables companies to complete their secure digital transformation journey and achieve enterprise-wide zero trust. We’ve built the best in the business, no question...

View Article

Zoom Outage Detected By Zscaler Digital Experience (ZDX)

Zscaler Digital Experience detects outage At 7:55 AM PDT on September 15, 2022, Zscaler’s Digital Experience (ZDX) saw a substantial, unexpected drop in the ZDX score for Zoom services across the...

View Article

Key Requirements for Monitoring Networks Within Secure Global Organizations

The shift to cloud applications and increase in mobility initiatives improves remote workforce productivity. However, to simplify end user access, network teams are constantly under pressure to design...

View Article

Understanding the Root Cause of Common Problems With Your Microsoft Teams Call

The pandemic has triggered many organizations to reevaluate whether employees will return to the office or stay remote. According to a Forbes article, a study by IWG (known for Regus flexible...

View Article


Technical Analysis of Crytox Ransomware

Key points Crytox is a ransomware family consisting of several stages of encrypted code that was first observed in 2020 The ransomware encrypts local disks and network drives and leaves a ransom note...

View Article

Zero Trust for Healthcare

Cybersecurity has become a strategic imperative for healthcare organizations. Data breaches increased 650% in 2021 and the associated costs increased 29.5%. The rising adoption of telehealth, a mobile...

View Article


Agent Tesla RAT Delivered by Quantum Builder With New TTPs

Zscaler ThreatLabz has observed a campaign that delivers Agent Tesla, a .NET based keylogger and remote access trojan (RAT) active since 2014, using a builder named “Quantum Builder” sold on the dark...

View Article

The Results Are in: VPNs Are Downright Dangerous

What’s keeping security professionals up at night these days? The answer may surprise you. Today, a new survey [the second annual] conducted by Cybersecurity Insiders and commissioned by Zscaler found...

View Article


How Zero Trust Can Accelerate Time to Value in Mergers and Acquisitions

The success of mergers and acquisitions (M&A) hinges on many factors, key amongst them successful integrations. In this, merging IT infrastructures is often a challenge but it is one that must...

View Article

A Cloud Platform is Greater Than the Sum of Its Parts During an M&A Transaction

Nothing exposes the challenges of complex IT infrastructures quite like mergers and acquisitions (M&A). Converging networks, data, applications, and user access controls takes time, is...

View Article

Wait a Minute! There's More Than One Type of (Security) Sandbox?

Not every day can be a beach day. Instead of driving hours to build sandcastles, why not bring the beach to you? In a very literal sense, sandboxes are isolated structures with sand that emulate the...

View Article
Browsing all 1471 articles
Browse latest View live