Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

DBatLoader: Actively Distributing Malwares Targeting European Businesses

This Zscaler ThreatLabz research article investigates the latest malware campaign of DBatLoader, which is being used by threat actors to target various businesses in European countries with Remcos RAT...

View Article


Technical Analysis of Xloader’s Code Obfuscation in Version 4.3

Key Points Xloader is a popular information stealing malware family that is the successor to Formbook. In early 2020, Formbook was rebranded as Xloader and the threat actors moved to a...

View Article


Coverage Advisory for 3CX Supply Chain Attack

Background: On 30th March 2023, 3CX released a security alert for 3CX Electron Windows App shipped in Update 7, which informed users about a supply chain attack. The issue has affected the executables...

View Article

OWASP Top 10: Injection Attacks, Explained

Welcome to the second installment of our OWASP Top 10 blog series, where we’ll be discussing one of the most critical web application security risks - injection attacks (ranked #3 on the OWASP Top 10)....

View Article

3CX Supply Chain Attack Campaign

On March 29th 2023, CrowdStrike published a blog outlining a supply chain attack leveraging the 3CXDesktopApp - a softphone application from 3CX. The ThreatLabz Team immediately started hunting for...

View Article


How to Secure Sensitive Data in the Public Cloud with Integrated CNAPP and DLP

Protecting critical business data requires two things: An understanding of where sensitive data resides. Comprehensive context of data, so you have knowledge of the possible paths that allow access to...

View Article

Top 5 Reasons Zscaler Partners Can’t Miss Zenith Live ’23

Zenith Live is back, better than ever! As a Zscaler partner, you’ll find all the latest tools and strategies you need to stay competitive. Plus, you’ll have the opportunity to hear directly from new...

View Article

Internet 2.0: A Quantum Leap for Secure Global Connectivity

The connectivity requirements of enterprises are rapidly changing due to cloud and hybrid work models. More agile scenarios are required in the course of digitization, and they must offer guaranteed...

View Article


One True Zero Live in London is a wrap!

Another One True Zero Live in EMEA is now complete, marking our tenth and arguably biggest and most successful event year to date. It was a pleasure to welcome our community again in person, following...

View Article


How to Cut IT Costs with Zscaler Part 6: Decreasing Carbon Footprint

Organizations everywhere are grappling with economic uncertainty. Day in and day out, they are forced to respond to increasing financial pressures that do not seem to be going away in the foreseeable...

View Article

Improve Network Path Analysis Beyond Traceroute With Zscaler Digital Experience

With applications and end users as distributed as they’ve become, most organizations have adjusted their workforces to hybrid environments. With this adjustment, IT must ensure excellent end user...

View Article

Join Leading Experts and Innovators at Zenith Live ’23 and Enhance Your...

With a hybrid workforce, making sure users can be productive from anywhere is key. However, when users aren’t always in the same location, troubleshooting can be difficult. Many organizations use...

View Article

The Cal-Secure Cybersecurity Roadmap

As part of our webinar on Cal-Secure, Dylan Pletcher, Chief Information Security Officer for the California Department of State Hospitals had a Q&A session with Carlos Ramos, Principal Consultant...

View Article


Zscaler Named a Leader in the 2023 Gartner Magic Quadrant for Security...

The 2023 Gartner Magic Quadrant for Security Service Edge (SSE) has just been published and Zscaler has once again been named as a Leader in this report. SSE is the modern approach to cybersecurity...

View Article

Stop Attacks Even Before They Happen: Unleash The Power of Zscaler Deception

As technologies advance, cyberthreats advance with them. Cyberattackers are finding innovative and better ways to infiltrate your environment and carry out stealthy attacks that aren’t easy to detect...

View Article


Nevada Ransomware: Yet Another Nokoyawa Variant

Key Points Nevada ransomware was advertised in criminal forums in December 2022 as part of a new ransomware-as-a-service affiliate program Nevada is written in the Rust programming language with...

View Article

Technical Analysis of Trigona Ransomware

Key Points Trigona is a ransomware family written in the Delphi programming language that has been active since at least June 2022 The Trigona threat group claims to perform double extortion attacks by...

View Article


Time-Saving Tips and How Not to Frustrate Users When Deploying Zero Trust...

As a former site reliability engineer, it’s really important to me to provide a great user experience when deploying new technology. In my opinion, you have only one shot to get it right with a user,...

View Article

Priyanka's Story

Priyanka BC, an employee based in India, “boomeranged” back to Zscaler in October 2021 after a two-year hiatus, having worked in the company for six years from 2013 to 2019. This is the story of her...

View Article

Introducing DevOpt: A Multifunctional Backdoor Arsenal

Summary In recent years, malware attacks have become increasingly sophisticated, and attackers are always finding new ways to exploit vulnerabilities and steal sensitive data. To stay ahead of these...

View Article
Browsing all 1471 articles
Browse latest View live