DBatLoader: Actively Distributing Malwares Targeting European Businesses
This Zscaler ThreatLabz research article investigates the latest malware campaign of DBatLoader, which is being used by threat actors to target various businesses in European countries with Remcos RAT...
View ArticleTechnical Analysis of Xloader’s Code Obfuscation in Version 4.3
Key Points Xloader is a popular information stealing malware family that is the successor to Formbook. In early 2020, Formbook was rebranded as Xloader and the threat actors moved to a...
View ArticleCoverage Advisory for 3CX Supply Chain Attack
Background: On 30th March 2023, 3CX released a security alert for 3CX Electron Windows App shipped in Update 7, which informed users about a supply chain attack. The issue has affected the executables...
View ArticleOWASP Top 10: Injection Attacks, Explained
Welcome to the second installment of our OWASP Top 10 blog series, where we’ll be discussing one of the most critical web application security risks - injection attacks (ranked #3 on the OWASP Top 10)....
View Article3CX Supply Chain Attack Campaign
On March 29th 2023, CrowdStrike published a blog outlining a supply chain attack leveraging the 3CXDesktopApp - a softphone application from 3CX. The ThreatLabz Team immediately started hunting for...
View ArticleHow to Secure Sensitive Data in the Public Cloud with Integrated CNAPP and DLP
Protecting critical business data requires two things: An understanding of where sensitive data resides. Comprehensive context of data, so you have knowledge of the possible paths that allow access to...
View ArticleTop 5 Reasons Zscaler Partners Can’t Miss Zenith Live ’23
Zenith Live is back, better than ever! As a Zscaler partner, you’ll find all the latest tools and strategies you need to stay competitive. Plus, you’ll have the opportunity to hear directly from new...
View ArticleInternet 2.0: A Quantum Leap for Secure Global Connectivity
The connectivity requirements of enterprises are rapidly changing due to cloud and hybrid work models. More agile scenarios are required in the course of digitization, and they must offer guaranteed...
View ArticleOne True Zero Live in London is a wrap!
Another One True Zero Live in EMEA is now complete, marking our tenth and arguably biggest and most successful event year to date. It was a pleasure to welcome our community again in person, following...
View ArticleHow to Cut IT Costs with Zscaler Part 6: Decreasing Carbon Footprint
Organizations everywhere are grappling with economic uncertainty. Day in and day out, they are forced to respond to increasing financial pressures that do not seem to be going away in the foreseeable...
View ArticleImprove Network Path Analysis Beyond Traceroute With Zscaler Digital Experience
With applications and end users as distributed as they’ve become, most organizations have adjusted their workforces to hybrid environments. With this adjustment, IT must ensure excellent end user...
View ArticleJoin Leading Experts and Innovators at Zenith Live ’23 and Enhance Your...
With a hybrid workforce, making sure users can be productive from anywhere is key. However, when users aren’t always in the same location, troubleshooting can be difficult. Many organizations use...
View ArticleThe Cal-Secure Cybersecurity Roadmap
As part of our webinar on Cal-Secure, Dylan Pletcher, Chief Information Security Officer for the California Department of State Hospitals had a Q&A session with Carlos Ramos, Principal Consultant...
View ArticleZscaler Named a Leader in the 2023 Gartner Magic Quadrant for Security...
The 2023 Gartner Magic Quadrant for Security Service Edge (SSE) has just been published and Zscaler has once again been named as a Leader in this report. SSE is the modern approach to cybersecurity...
View ArticleStop Attacks Even Before They Happen: Unleash The Power of Zscaler Deception
As technologies advance, cyberthreats advance with them. Cyberattackers are finding innovative and better ways to infiltrate your environment and carry out stealthy attacks that aren’t easy to detect...
View ArticleNevada Ransomware: Yet Another Nokoyawa Variant
Key Points Nevada ransomware was advertised in criminal forums in December 2022 as part of a new ransomware-as-a-service affiliate program Nevada is written in the Rust programming language with...
View ArticleTechnical Analysis of Trigona Ransomware
Key Points Trigona is a ransomware family written in the Delphi programming language that has been active since at least June 2022 The Trigona threat group claims to perform double extortion attacks by...
View ArticleTime-Saving Tips and How Not to Frustrate Users When Deploying Zero Trust...
As a former site reliability engineer, it’s really important to me to provide a great user experience when deploying new technology. In my opinion, you have only one shot to get it right with a user,...
View ArticlePriyanka's Story
Priyanka BC, an employee based in India, “boomeranged” back to Zscaler in October 2021 after a two-year hiatus, having worked in the company for six years from 2013 to 2019. This is the story of her...
View ArticleIntroducing DevOpt: A Multifunctional Backdoor Arsenal
Summary In recent years, malware attacks have become increasingly sophisticated, and attackers are always finding new ways to exploit vulnerabilities and steal sensitive data. To stay ahead of these...
View Article