Unleashing the Power of Zscaler Cloud Operations for Unprecedented Cloud...
Rapid adoption of cloud services has helped organizations innovate, save on costs, and more. However, as more critical services rely on cloud resources, organizations need to plan for unexpected...
View ArticleIntroduction: OTZ Use Cases | Zscaler Zero Trust Exchange
Introducing the Zscaler “One True Zero” Use Case Video Series? Most people that we talk to are already bought into some or all of the core tenets of zero trust, whether or not they use that term. They...
View ArticleStatc Stealer: Decoding the Elusive Malware Threat
Introduction Recently, while tracking global threat activity, the Zscaler ThreatLabz team discovered a new information stealer family called: Statc Stealer. Statc Stealer is a sophisticated malware...
View ArticleSecurity Advisory: Remote Code Execution Vulnerability (CVE-2023-3519)
Introduction On 18 July 2023, Citrix published a security advisory that addressed a critical vulnerability with CVSS score 9.8 for CVE-2023-3519 for RCE (Remote Code Execution) in NetScaler ADC...
View ArticleWhy should CISOs take a managed security service approach to cybersecurity?
Generative Artificial Intelligence (AI) has been the talk of the cyber community ever since ChatGPT came into existence. While most people are zeroing in on the benefits and risks of said technology,...
View ArticleMapping of Zscaler Solutions to the DoD Zero Trust Strategy
The federal government has taken on the task of transforming its cybersecurity approach to Zero Trust. This transformation is uniquely challenging for the largest government agency, the Department of...
View ArticleJanelaRAT: Repurposed BX Rat Variant Targeting LATAM FinTech
Introduction In June of 2023, our research team at Zscaler ThreatLabz discovered a threat actor targeting FinTech users in the LATAM region. JanelaRAT involves several tactics, techniques, and...
View ArticleSaving Money with Zero Trust Part 4: Stopping Costly Breaches
Reducing costs has skyrocketed to the top of the priority list for organizations everywhere. For the last few years, economic uncertainty has been fueled by COVID lockdowns, supply chain issues,...
View ArticleThe Impact of the SEC’s New Cybersecurity Policies
Introduction The rapid advancement of technology has led to an increasing number of cybersecurity incidents that pose significant risks to organizations, their stakeholders, and the general public....
View ArticleAgniane Stealer: Dark Web’s Crypto Threat
Introduction The Zscaler ThreatLabz team recently discovered a new information stealer family: Agniane Stealer. This malware steals credentials, system information, and session details from browsers,...
View ArticleInternet Egress Security Architecture for AWS Workloads | Part 2 - Isolated VPCs
Background and Recap of Part 1 In Part 1 of this blog series, Internet Egress Security Architecture for AWS Workloads - Regional Hubs, I discussed the complexities organizations encounter when securing...
View ArticleSaving Money with Zero Trust Part 5: Enhancing User Experiences
Over the last few years, global events, including pandemic lockdowns, rising inflation, and much more, have dramatically increased economic uncertainty. In the business world, this has inevitably led...
View ArticleAchieve Business and Operational Goals By Understanding the Economics of...
Each department has a favorite monitoring tool to diagnose an issue when an IT outage happens. If the outage is widespread, multiple IT teams will eventually end up in a war room, trying to solve the...
View ArticleProtect Your Cloud Infrastructure From Insider Threats and Data Loss
As more enterprises make the move to the public cloud, one of the most significant security threats to cloud infrastructure are often insider threats. They’re an inherent risk given the obvious reason...
View ArticleA Look Into DuckTail
Introduction In our persistent quest to decode DuckTail’s maneuvers, Zscaler ThreatLabz began an intelligence collection operation in May 2023. Through an intensive three-month period of monitoring, we...
View ArticleReduce Mean Time To Resolution With Zscaler’s Digital Experience Monitoring...
It's no secret that moving to the cloud can boost productivity and create a happier workforce. Many organizations have already made the switch and are allowing employees to work from anywhere at any...
View ArticleEnhancing Security with Flow Logging: Exploring Zscaler Client Connector's...
Organizations face increasing cyberthreats in today’s digital landscape, making robust security measures a top priority. As a leader in cloud security, we offer a powerful feature in Zscaler Client...
View ArticleSaving Money with Zero Trust Part 3: Accelerating M&A Time-to-Value
As economic uncertainty continues to run amok and give rise to fears of a recession, organizations the world over are trying to reduce their costs across the board. Unfortunately, even critical teams...
View ArticleThe Impact of the SEC’s New Cybersecurity Policies
Introduction The rapid advancement of technology has led to an increasing number of cybersecurity incidents that pose significant risks to organizations, their stakeholders, and the general public....
View ArticleAgniane Stealer: Dark Web’s Crypto Threat
Introduction Agniane Stealer fraudulently takes credentials, system information, and session details from browsers, tokens, and file transferring tools. Agniane Stealer also heavily targets...
View Article