A Look at CVE-2024-3400 Activity and Upstyle Backdoor Technical Analysis
IntroductionRecently, a zero-day command-injection vulnerability, assigned to CVE-2024-3400, was found in the Palo Alto Networks PAN-OS. It was assigned the maximum severity score of 10.0 and can be...
View ArticleZscaler Supports Steve Gibbins' Tour 21 Fundraising
Every year, 176 cyclists and millions of spectators descend on France for one of the most gruelling sporting events in the world, le Tour de France. A race steeped in history, and those who adorn the...
View ArticleCongratulations to our 2024 Zscaler Partners of the Year
Last week at the Zscaler Americas Executive Partner Summit we announced our 2024 Americas Partners of the Year. The Zscaler Partner Ecosystem is a key differentiator and force multiplier for us in the...
View ArticleBlack Hat SEO Leveraged to Distribute Malware
IntroductionZscaler ThreatLabz researchers recently encountered a significant number of websites associated with fraudulent activities being hosted on popular web hosting and blogging platforms. Threat...
View ArticlePhishing Attacks Rise 58% in the Year of AI: ThreatLabz 2024 Phishing Report
Phishing threats have reached unprecedented levels of sophistication in the past year, driven by the proliferation of generative AI tools. Transforming how cybercriminals operate, AI advancements are...
View ArticleZscaler Digital Experience Just Got Smarter And Wiser: Introducing a New AI...
Businesses rely on technology to keep employees productive - organizations with 250+ employees use more than 100 SaaS apps, and todays’ end users expect flawless digital experiences when interacting...
View ArticleAmericas Executive Partner Summit Recap
After hosting more than 100 partner executives at our Zscaler Executive Partner Summit, we are going into this week feeling both immensely grateful and highly energized. Time is our most valuable...
View ArticleStep Into the Future of ZDX with 3 Exciting New Features: ZDX Copilot, Data...
Many organizations face challenges supporting a distributed workforce, and pressure on IT resources continues to increase. Zscaler is relentlessly focused on enhancing our Digital Experience platform...
View ArticleZloader Learns Old Tricks
IntroductionZloader (a.k.a. Terdot, DELoader, or Silent Night) is a modular trojan based on leaked ZeuS source code. As detailed in our previous blog, Zloader reemerged following an almost two-year...
View ArticleCisco ASA Firewall Vulnerability: What to Do When Security Is a Target
The Year of the Dragon has seen some notable events so far: a total eclipse, Facebook’s 20th anniversary, and another Taylor Swift streaming record. But 2024 has also become the Year of the Hardware...
View ArticleEnabling the Secure use of AI in Government
Artificial intelligence (AI) and machine learning (ML) tools hold the potential to transform governmental and public-sector organizations. Indeed, such technologies promise to reshape how public sector...
View ArticleHow Zscaler is taking our partner marketing commitment to the next level
Introducing the All-New Partner Demand Center, your launchpad for marketing with ZscalerFor the past 12 months, Zscaler has transformed our partner program, empowering our partners to thrive in the...
View ArticleZscaler Extends Zero Trust + AI Showcase at 2024 AWS Summit Events
We recently presented our industry-leading zero trust + AI solutions to thousands of attendees at the AWS Summit events in Paris, Amsterdam, Sydney, and London (more to come—see below) and the response...
View ArticleZscaler for Users - Essentials Learning Path: Your Gateway to Mastering Zero...
Tired of accidental misconfigurations leaving your cloud security vulnerable? A recent CIO magazine article rings the alarm bell: 99% of cloud security failures will be linked to human error by 2025,...
View ArticleZscaler: The Digital Trail Guide to Moving Applications to the Cloud
In the grand, often mazelike halls of healthcare IT, there exists a tale as old as time—or at least as old as the first digital patient record. A tale of valiant healthcare institutions, battling the...
View ArticlePutting our Fundraising into a higher gear: Recapping Zscaler’s Fundraising...
As those of you who read my previous blog will know, Zscaler is proud to be supporting Steve Gibbins’ Tour 21 fund raising efforts for Cure Leukaemia, a blood cancer charity that gives patients access...
View ArticleZscaler Selects Red Hat Enterprise Linux 9 (RHEL 9) as Next-Gen Private...
What’s new?On June 30, CentOS 7 will reach end of life, requiring migrations in many software stacks and server environments. In advance of this, Zscaler has selected Red Hat Enterprise Linux 9 as the...
View ArticleHijackLoader Updates
IntroductionHijackLoader (a.k.a. IDAT Loader) is a malware loader initially spotted in 2023 that is capable of using a variety of modules for code injection and execution. It uses a modular...
View ArticleNew VPN Risk Report: 56% of Enterprises Attacked via VPN Vulnerabilities
Virtual private networks (VPNs) have long provided remote access for enterprises. However, after a year full of high-profile exploits of severe and zero-day VPN vulnerabilities, including ones...
View ArticleCVE-2024-3661, a.k.a. TunnelVision, Exposes a VPN Bypass Vulnerability
IntroductionOn May 6, 2024, a researcher from Leviathan Security Group identified a new technique, termed as “TunnelVision”, that can bypass VPN encapsulation and enable attackers to send the traffic...
View Article