Don’t Let COVID-19 Chaos Derail Two Years’ Worth of GDPR Efforts
The General Data Protection Regulation (GDPR) required any organisation doing business with European citizens to make significant changes by May 2018 when it came into effect. In its first year of...
View ArticleShellReset RAT Spread Through Macro-Based Documents Using AppLocker Bypass
As we've mentioned in previous blogs, cybercriminals will often tie their attacks to current events. So, it isn't surprising that we noticed another one of these, with this particular one using tech...
View ArticleMeet Zscaler: What Three Years at Zscaler Means to Carolina Monge
Carolina Monge’s career has spanned two continents and multiple industries, but her role at Zscaler has solidified her success. Her love of spreading knowledge doesn’t stop at training new hires—she...
View ArticleBe Humble: Crisis Leadership is an Exercise in Humility
I recently participated in a webinar on the topic of leadership. The experience gave me a new perspective on what it means to be a leader in difficult times. I’ve heard it said, “Anyone can lead an...
View ArticleStop Singing the “Legacy Network Blues”
Is your corporate network slow? Or difficult to manage? Are you finding your legacy castle-and-moat security complex and expensive (and, let’s face it, sometimes not particularly secure)? Are you...
View ArticleNew Campaign Abusing StackBlitz Tool to Host Phishing Pages
There are numerous tools available to help individuals create new, exciting webpages. And, there seem to be just as many hackers looking to exploit these tools for their own gain. Recently, the Zscaler...
View ArticleMeet Zscaler: How a Busy Family Man, Salesman, and Outdoorsman Just Keeps...
More than 20 years in sales makes Ted Rutsch a veteran on the Sales America Public Sector team, but he couldn’t be more excited to be part of the Zscaler family at a time of great transformation....
View ArticleGoing Virtual: Lessons Learned from Scaling to More Than 6,500 Remote Offices
Craig Williams is the CIO of Ciena. His post originally appeared on LinkedIn. For years, my team felt we had discovered the secret to making work more productive, effective, and enjoyable while...
View ArticleTop Exploit Kit Activity Roundup—Spring 2020
This is the eleventh in a series of quarterly roundups by the Zscaler ThreatLabZ research team in which we collect and analyze the activity of the top exploit kits (EKs) during the past three months....
View ArticleThe Return of the Higaisa APT
Cybercriminals will often use LNK files attached in an email to launch an attack on unsuspecting victims. And we recently noticed another campaign using this technique. In May 2020, we observed several...
View ArticleThe Results Are In: Zscaler Excels in Recent AV-TEST
As you know, the Zscaler ThreatLabZ team is intently focused on the security of our customers. We know exactly how much traffic we’re securing for our clients (2.4 trillion transactions last month). We...
View ArticleMeet Zscaler: From Sales to Enablement - How Megan Allen Found Her Passion
Though Megan Allen’s enthusiasm for sales may have started at age five, she wasn’t afraid to pursue a new career direction at Zscaler. Enablement and helping others is where she finds her passion. In...
View ArticleA New At-Home Workforce in 48 Hours
Nitin Agarwal is the President and Group CIO, CTO and Chief Digital Officer of Edelweiss Financial Services. The past few months have been, to say the least, a challenge for organizations around the...
View ArticleGartner ZTNA and Enabling the “Work From Anywhere” Reality
Summary The need to enable work from anywhere is accelerating adoption of ZTNA services Gartner's newly released new guidance around ZTNA technologies Five considerations for selecting a ZTNA service...
View ArticleTargeted attacks on Australian Networks (ACSC Advisory) - Zscaler Coverage
Background Earlier today Australian Cyber Security Centre (ACSC) released an advisory regarding a cyber campaign targeting Australian networks. The campaign is dubbed ‘Copy-paste compromises’ due to...
View ArticleTargeted Attack Leverages India-China Border Dispute to Lure Victims
Malicious threat actors are always ready to take advantage of current affairs to maximize the success rate of their attacks. The Zscaler ThreatLabZ team recently came across one such attack trying to...
View ArticleIn a COVID-19 World, Zero Trust is More Relevant Than Ever
This post originally appeared on LinkedIn, May 27, 2020. You’re an IT administrator. You thought everybody working from home would be a dream come true: None of the desktop deployments, support...
View ArticleDitch the Complexity and Cost of CASB Point Product Overlays
Ask just about any industry analyst and you will hear the same thing—enterprises with a significant cloud presence need a cloud access security broker (CASB) to protect their cloud-based data. But not...
View ArticleTaurus: The New Stealer in Town
A sandbox is a valuable tool in the ongoing battle against cybercriminals and bad actors are continually looking for ways to avoid detection. One of the newest ones we observed, Taurus, includes...
View ArticleZscaler and Silver Peak: Helping Organizations Enable a Secure Access Service...
No one knows what the work world will look like once the pandemic restrictions are lifted and employees are allowed back into the office. Will everyone return to their headquarters and branch offices?...
View Article