All Blogs

News and views from the leading voice in cloud security.


By: Anthony Gil

Top 7 Cybersecurity Stories This Week 12-02-2016

Too busy working to keep up with cybersecurity news this week? Here’s a round-up of the top stories from the cyberscape.

SF Muni Systems back online following weekend ransomware attack San Francisco commuters were given an unexpected surprise of free rides this holiday weekend, following a ransomware attack that took down the city's MUNI fare system. On Saturday, the hackers left…
By: Ed Miles

CNACOM - Open Source Exploitation via Strategic Web Compromise

APT

Introduction Since a full proof of concept for CVE-2016-0189 vulnerability was published on GitHub, Zscaler ThreatLabZ has been closely tracking its proliferation. The first copying of the exploit code we spotted was from the Sundown exploit kit (EK), followed closely by…
By: Widler Mathias

A “no cloud” strategy is no strategy at all

When I hear organisations report that they have consciously decided against cloud enablement, I have to scratch my head. In my opinion, there really is no such thing as a no cloud strategy. Whether companies sanction the use of cloud…
By: Atinderpal Singh

A look at recent Stampado ransomware variant

Self-propagates and encrypts files already encrypted by other ransomware

Ransomware

Introduction Stampado is one of the many new ransomware strains we have seen in 2016. Stampado was first seen in the wild in July 2016, as one of the cheapest pieces of ransomware available on the underground forums.   Figure 1…
By: Anthony Gil

Top 7 Cybersecurity Stories This Week 11-18-2016

Too busy working to keep up with cybersecurity news this week? Here’s a round-up of the top stories from the cyberscape.

Another half a million adultfriendfinder profiles hacked A massive data breach targeting adult dating and entertainment company Friend Finder Network has exposed more than 412 million accounts. The hack includes 339 million accounts from AdultFriendFinder.com, which the company describes as…
By: Deepen Desai

IoT devices in the enterprise

A look at the enterprise IoT device footprint and IoT traffic analysis

Analysis | Compromise

In the months prior to the recent attacks, which used Internet of things (IoT) devices to carry out massive distributed-denial-of-service (DDoS) attacks, the ThreatLabZ research team had begun studying the use of IoT devices on the networks of Zscaler customers.…
By: Anthony Gil

Top 7 Cybersecurity Stories This Week 11-11-2016

Too busy working to keep up with cybersecurity news this week? Here’s a round-up of the top stories from the cyberscape.

Tesco Bank Halts Online Payments for Customers After Money Taken from 20,000 Accounts Tesco Bank has reported that about 40,000 accounts saw suspicious transactions over the weekend and half of those had money taken. The bank is currently blocking customers…
By: Matt Piercy

Consolidation in the security market

How workplace trends are shaking up cybersecurity

In the past year, the Internet security market has seen several high-profile mergers and acquisitions. One company Blue Coat has been both the acquirer and the acquired. At the end of 2015, Blue Coat bought Elastica for $280 million, only…

Learn more about Zscaler.
Join one of our webcasts.

How secure are you?

Check your security with our instant risk assessment, Security Preview. It’s free, confidential and safe. 85% of companies who run this test find vulnerabilities that require immediate attention.