All Blogs

News and views from the leading voice in cloud security.

By: Michael Sutton

Yahoo breach affects half a billion shrugs

While the press and rumor mill turn full tilt in the wake of the announcement from Yahoo last week that it had been the victim of perhaps the largest known data breach ever (more records were breached than there are…
By: Anthony Gil

Top 7 Cybersecurity Stories This Week

Too busy working to keep up with cybersecurity news this week? Here’s a round-up of the top stories from the cyberscape.

Largest DDoS attack EVER hits KrebsOnSecurity Blog The biggest DDoS attacks ever seen has been aimed at security blogger, Brian Krebs, after he exposed hackers who carry out such attacks for cash. At its peak, the attack aimed 620 gigabits…
By: Rene Paap

Hybrid buyer beware

Some solutions are being driven by marketing, not engineering.

When I hear the term hybrid, what often comes to mind is best of both worlds or merging the old with the new. I credit Toyota with this word association, as its Prius was the first mass-produced hybrid car dating…
By: Dhanalakshmi

Compromised Websites Delivering Tech Support Scams and Credit Card Hijacks

Tech Support Scams and Magento Credit Card Hijacking

Compromise | Scam

Introduction   Tech support scams and credit card hijacking attacks are not new. These types of cyber-fraud have been seen in the wild as supported extensions for Internet Explorer, Firefox, and Chrome; they become distributed through various monetization platforms during…
By: Atinderpal Singh

iSpy Keylogger


Keyloggers have always been present in attackers toolkits. They give attackers the power to record every keystroke from a victim s machine and steal sensitive information. Zscaler ThreatLabZ recently came across a signed keylogger campaign in our cloud sandbox. In…
By: Yogi Chandiramani

Creating insight out of a mountain of network data

The foundation of a solid security model is visibility, deep insight into what is going on in a corporate network. Without visibility into applications, users, and network traffic, an IT team cannot make appropriate decisions about security controls. Gaining visibility…
By: Robert Schlossman

Law firm security is keeping chief legal officers up at night

One of the things that I most enjoy about being a Chief Legal Officer is meeting other CLOs and in-house attorneys. I always ask them some version of the following question What is keeping you up at night More and…
By: Ed Miles

A quick look at recent malvertising exploit chains

Featuring RIG and Sundown EK

Exploit Kit

Introduction Zscaler ThreatLabZ, during our daily exploit kit (EK) tracking, have been seeing some changes in both RIG and Sundown EKs. We recently encountered a malvertising chain serving both EKs on subsequent visits, and decided to compile a quick look at…

Learn more about Zscaler.
Join one of our webcasts.

How secure are you?

Check your security with our instant risk assessment, Security Preview. It’s free, confidential and safe. 85% of companies who run this test find vulnerabilities that require immediate attention.

Average risk level results from people like you: VERY HIGH