Network World and Zscaler Survey: Why it’s Time for a New Approach to SD-WAN...
SD-WAN has shown that it can deliver a faster user experience, reduced costs, and simplified branch IT. But, despite all of the potential benefits, security remains one of its shortcomings. And,...
View ArticleFake Sites Stealing Steam Credentials
Recently, the Zscaler ThreatLabZ team came across multiple fake Counter-Strike: Global Offensive (CS:GO) skin websites aimed at stealing Steam credentials. These sites use an uncommon phishing...
View ArticleHave You Lost That Loving Feeling For Your VPN?
Valentine’s Day is the day to celebrate loving relationships filled with joy and happiness. But, as we all know, not all relationships work out. Even those that seemed like a perfect fit at the start...
View ArticleZscaler at RSA: They Can’t Attack What They Can’t See
Now that private apps are moving to public clouds, and users are accessing them from locations all around the world, on a variety of devices, the classic perimeter has changed. You'll probably hear a...
View ArticleMulticomponent Malware Targeting Cryptocurrency
Cryptocurrency continues to soar in popularity among investors and traders, which also makes it a frequent target for cybercriminals. According to a CNBC report, hackers stole $1.7 billion worth of...
View ArticleShining a Light on Shadow IoT to Protect Your Organization
The Zscaler ThreatLabZ team released new research today (IoT in the Enterprise 2020: Shadow IoT Emerges as a Security Threat) that finds shadow IoT devices and traffic are quickly growing in...
View ArticleWhy Federal CISOs Need Zero Trust
Federal agencies working to secure hybrid environments are rethinking traditional security strategies. Looking for options that make sense for cloud-enabled, highly mobile teams, many agencies are...
View ArticleCareer Advice to Sales Reps in their 30s
Recently, I interviewed a very impressive 30-year-old candidate for a sales role. During the interview, she asked if I had any type of career strategy when I was her age. The question intrigued me and...
View ArticleA Look Back at RSAC 2020
Each year, by the end of the RSA Conference, it’s typical for teams to get together and discuss what they learned, who they met, significant keynotes, and which companies stood out (or were missing) in...
View ArticleZscaler Cloud Operations Conducts Successful Business Continuity Drill
Zscaler runs the world’s largest cloud security platform, and the company’s cloud operations team is charged with ensuring the platform is resilient in the face of any natural or manmade disaster or...
View ArticlePersistent Threats Pose a Growing Risk in 2020
APT stands for Advanced Persistent Threat, but many organizations forget about the “P” and focus only on “advanced threats.” That strategy may be prudent if IT resources are limited, as the vast...
View ArticleRising Together: A Look at Diversity and Inclusion in Cybersecurity
Reflecting on International Women’s Day, I’m grateful to work for an organization that empowers women in the workplace and encourages me to continue to grow. As we know from a wide range of academic...
View ArticleMicrosoft Remote Code Execution vulnerability in SMBv3 service: CVE-2020-0796
Background On 12th March 2020 Microsoft has released a Security guidance regarding Remote Code Execution vulnerability in the way that Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles...
View ArticleThe Emergence of Coronavirus and Olympics Scams
Cybercriminals have always used a crisis as an opportunity to scam people. Many in the tech industry have noticed new scams and campaigns aimed at taking advantage of people's uncertainty around the...
View ArticleEmpowering Employees to Work Remotely During COVID-19
These are unpredictable and unsettling times. Like all of you, I am watching events unfold in the global response to COVID-19, and I am doing what is best for my family, the Zscaler family, and our...
View ArticleCovidLock: Android Ransomware Walkthrough and Unlocking Routine
As the coronavirus has been declared a pandemic, bad actors are certainly going to take advantage of the uncertainty around it to attack a large number of online users. The Zscaler ThreatLabZ team...
View ArticleWhy Proxies and Firewalls Are Essential in the Modern Threat Landscape
Since the early days of the internet, web proxies have been an essential component of security stacks—and for lots of good reasons. For one thing, proxies provide performance benefits and offer deeper...
View ArticleNew Android App Offers Coronavirus Safety Mask But Delivers SMS Trojan
Amidst the coronavirus/COVID-19 pandemic, attackers continue to seek ways to exploit the public's fears to victimize online users. ThreatLabZ researchers recently came across a domain named...
View ArticleGreat Leaders Build Healthy Corporate Cultures
Recently I had dinner with an exceptional sales candidate who was late because he "was having an argument with the support team in his company." I know the company well and know it has a corporate...
View ArticleCoronavirus-Themed Document Targets Brazilian Users
During the ongoing COVID-19 outbreak, threat actors are leveraging different techniques to infect victims around the world. ThreatLabZ researchers came across an attack vector used in the wild on March...
View Article