All Blogs

News and views from the leading voice in cloud security.


By: Anthony Gil

Top 7 Cybersecurity Stories This Week 12-09-2016

Too busy working to keep up with cybersecurity news this week? Here’s a round-up of the top stories from the cyberscape.

Cyber Panel to Trump Train 100,000 hackers The number seems unrealistic to some cybersecurity experts but there is a clear need. There's currently a severe shortage of computer scientists who know how to hack and to defend from hackers. As…
By: Derek Gooley

Top Exploit Kit Activity Roundup - Fall 2016

Exploit Kit

Overview This is the third in a series of blogs reviewing the activity of the current top exploit kits. Exploit Kits (EKs) are rapidly deployable software packages designed to leverage vulnerabilities in web browsers as a way to deliver a…
By: Chakkaravarthy Balaiah

Not everyone went to work on Black Friday, but many of those who did were shopping

Amazon clearly won the day

While many of us were recovering from turkey dinner or were heading out to brave Black Friday crowds, a lot of people were working or were they   The traffic we see on the Zscaler cloud is entirely from business…
By: Anthony Gil

Top 7 Cybersecurity Stories This Week 12-02-2016

Too busy working to keep up with cybersecurity news this week? Here’s a round-up of the top stories from the cyberscape.

SF Muni Systems back online following weekend ransomware attack San Francisco commuters were given an unexpected surprise of free rides this holiday weekend, following a ransomware attack that took down the city's MUNI fare system. On Saturday, the hackers left…
By: Ed Miles

CNACOM - Open Source Exploitation via Strategic Web Compromise

APT

Introduction Since a full proof of concept for CVE-2016-0189 vulnerability was published on GitHub, Zscaler ThreatLabZ has been closely tracking its proliferation. The first copying of the exploit code we spotted was from the Sundown exploit kit (EK), followed closely by…
By: Widler Mathias

A “no cloud” strategy is no strategy at all

When I hear organisations report that they have consciously decided against cloud enablement, I have to scratch my head. In my opinion, there really is no such thing as a no cloud strategy. Whether companies sanction the use of cloud…
By: Atinderpal Singh

A look at recent Stampado ransomware variant

Self-propagates and encrypts files already encrypted by other ransomware

Ransomware

Introduction Stampado is one of the many new ransomware strains we have seen in 2016. Stampado was first seen in the wild in July 2016, as one of the cheapest pieces of ransomware available on the underground forums.   Figure 1…
By: Anthony Gil

Top 7 Cybersecurity Stories This Week 11-18-2016

Too busy working to keep up with cybersecurity news this week? Here’s a round-up of the top stories from the cyberscape.

Another half a million adultfriendfinder profiles hacked A massive data breach targeting adult dating and entertainment company Friend Finder Network has exposed more than 412 million accounts. The hack includes 339 million accounts from AdultFriendFinder.com, which the company describes as…

Learn more about Zscaler.
Join one of our webcasts.

How secure are you?

Check your security with our instant risk assessment, Security Preview. It’s free, confidential and safe. 85% of companies who run this test find vulnerabilities that require immediate attention.