Tweaks Stealer Targets Roblox Users Through YouTube and Discord
IntroductionZscaler’s ThreatLabz recently discovered a new campaign distributing an infostealer called Tweaks (aka Tweaker) that targets Roblox users. Attackers are exploiting popular platforms, like...
View ArticleZscaler Selects Red Hat Enterprise Linux 9 (RHEL 9) as Next-Gen Private...
What’s new?On June 30, CentOS 7 will reach end of life, requiring migrations in many software stacks and server environments. In advance of this, Zscaler has selected Red Hat Enterprise Linux 9 as the...
View Article2024 Zscaler Public Sector Summit in Washington DC
In March 2023 Zscaler held its inaugural Public Sector Summit, bringing together over 500 government and industry leaders together to separate zero trust fact from fiction. The exchange last year was...
View ArticleMobile World Congress shows a vision of even more connected things
I approached this year’s Mobile World Congress as I usually would – with a very open mind. However, this year was different. It was far more fulfilling than previous years and, in some ways, had me...
View ArticleBreak Free from Appliance-Based Secure Web Gateway (SWG)
The way we work today is vastly different from a few years ago. McKinsey & Company’s State of Organization 2023 report identified that before the COVID-19 pandemic, most organizations expected...
View ArticleProtecting Identity Becomes Pivotal in Stopping Cyberattacks
As today’s workplace transforms, data is no longer centralised and is spread across cloud, increasing the attack surface. Attackers are constantly looking for vulnerabilities to exploit and searching...
View ArticleThe Best Medicine for Healthcare Data Is Integrated DLP
You could argue that the challenges of securing medical data are more imposing than those of securing any other form of data. Electronic health records (EHR) are often transferred and shared between...
View ArticleEliminate Risky Attack Surfaces
Many moons ago, when the world wide web was young and the nerd in me was strong, I remember building a PC and setting it up as a web server. In those exciting, pioneering days, it was quite something...
View ArticleNew AI Insights: Explore Key AI Trends and Risks in the ThreatLabz 2024 AI...
Today, Zscaler ThreatLabz released its inaugural ThreatLabz 2024 AI Security Report. This report comes at a key inflection point: as AI tools and language models (LLMs) like ChatGPT weave their way...
View ArticleCVE Advisory: CVE-2024-3094 - Security Compromise in XZ Utils
IntroductionOn March 29th, a security incident surfaced involving XZ Utils, a widely utilized data compression package integrated into major Linux distributions. Malicious code, allowing unauthorized...
View ArticleExposing the Dark Side of Public Clouds - Combating Malicious Attacks on...
IntroductionThis article compares the cybersecurity strategies of a company that does not use Zscaler solutions with one that has implemented Zscaler's offerings. By exploring two different scenarios,...
View ArticleBetrayal in the Cloud: Unmasking Insider Threats and Halting Data...
Introduction In today’s digital world, safeguarding sensitive data, such as source code, is crucial. Insider threats are a worthy adversary, posing significant risk, especially with trusted employees...
View ArticleJoin Zscaler for the Future of Digital Experience Monitoring Event
It's time to register for the Future of Digital Experience Monitoring event. Here are a few reasons why you can’t miss it! See what it takes to keep end users productive no matter the device, network,...
View ArticleAutomating Pikabot’s String Deobfuscation
IntroductionPikabot is a malware loader that originally emerged in early 2023 with one of the prominent features being the code obfuscation that it leverages to evade detection and thwart technical...
View ArticleZscaler is showcasing Zero Trust + AI at the 2024 AWS Summit events across...
In today’s dynamic digital landscape, organizations are rapidly adopting artificial intelligence (AI) and Generative AI (GenAI) tools to increase productivity, gain new insights, and obtain a...
View ArticleZscaler Announces Intent to Acquire Airgap Networks to Extend Zero Trust SASE...
OverviewToday, Zscaler has announced the next major step in its Zero Trust SASE leadership by signing an agreement to acquire Airgap Networks, which provides agentless segmentation for enterprise IT...
View ArticleWhy You Need a Proven Platform for Zero Trust
Organizations need a proven platform for zero trust. But before we dive into why that is the case, we must first answer two important questions. What is zero trust? Zero trust is a distinct...
View ArticleAnother CVE (PAN-OS Zero-Day), Another Reason to Consider Zero Trust
A Year of Critical Zero Days: Firewalls, VPNs, and more This past year has been, in many ways, the year of zero-day vulnerabilities for externally exposed assets — a trend that has laid bare some of...
View ArticleMalvertising campaign targeting IT teams with MadMxShell
IntroductionBeginning in March of 2024, Zscaler ThreatLabz observed a threat actor weaponizing a cluster of domains masquerading as legitimate IP scanner software sites to distribute a previously...
View ArticleHow the Zscaler SaaS Security and Data Discovery Reports Are Healthcare’s...
SaaS Security Report: A Not-So-Secret Identity Imagine a world where the heroes don't wear capes, but wield reports. And not just any reports: we're talking about the Zscaler SaaS Security Report, a...
View Article