All Blogs

News and views from the leading voice in cloud security.


By: Anthony Gil

Top 7 Cybersecurity Stories This Week 01-20-2017

Too busy working to keep up with cybersecurity news this week? Here’s a round-up of the top stories from the cyberscape.

Smart Cam has Critical Flaw The popular Samsung SmartCam security cameras contain a critical remote code execution vulnerability that could allow hackers to gain root access and take full control of them. The flaw allows for command injection through a…
By: Viral Gandhi

Super Mario Run Malware #2 – DroidJack RAT

Gamers love Mario and Pokemon, but so do malware authors.

Mobile Malware

A few days back, we wrote about an Android Marcher trojan variant posing as the Super Mario Run game for Android. We have found another instance of malware posing as the Super Mario Run Android app, and this time it has taken…
By: Anthony Gil

Top 7 Cybersecurity Stories This Week 01-13-2017

Too busy working to keep up with cybersecurity news this week? Here’s a round-up of the top stories from the cyberscape.

Hello Kitty Database Leaked The badly configured Sanrio database was copied before it was fixed and it went unnoticed for a year. The database resurfaced online with over 3.3 million records. At the time, Sanrio speculated the exposure was due…
By: Viral Gandhi

Android Marcher now posing as Super Mario Run

Attackers seek to use the game's popularity to spread malware

Mobile

Nintendo recently released Super Mario Run for the iOS platform. In no time, the game became a sensational hit on the iTunes store. However, there is not yet an Android version and there has been no official news on such a…
By: Anthony Gil

Top 7 Cybersecurity Stories This Week 01-06-2017

Too busy working to keep up with cybersecurity news this week? Here’s a round-up of the top stories from the cyberscape.

Confidential Military Personnel Data Leaked MacKeeper researcher Chris Vickery discovered a large volume of data leaked online from Potomac Healthcare Solutions, which provides services to the U.S. Army, Navy, Marine Corps, Air Force and other public sector organizations. An analysis…
By: Anthony Gil

10 Biggest Security Stories of 2016

2016 had its ups and its downs, but as the year comes to an end, here are the stories that made it to the top.

Dyn/Krebs DDoS and the Mirai BotNet As the denial of service (DDOS) attack against Dyn shook the internet a little over a week ago, it brought to the public forefront the changing dynamics of power in the online world. In…
By: Nick Kael

Rogue One: A Star Wars Story

A lesson in cyber and physical security?

As I sat through the premiere of Rogue One A Star Wars Story this past weekend, I couldn t help but relate it back to a familiar tale that consistently comes up in IT security. The similarities were striking as…
By: Chris Mannon

Santa Claus is coming to town with a sack full of ransomware

Abuse | Adware | Analysis | Exploit | Malware | Phishing | Ransomware | Scam | Spam

It s the season holiday shopping has increased and email inboxes have been inundated with promotional emails, offers from online retailers, and discount banners. And with increased online shopping activity, you can expect to see an increase in activity from…

Learn more about Zscaler.
Join one of our webcasts.

How secure are you?

Check your security with our instant risk assessment, Security Preview. It’s free, confidential and safe. 85% of companies who run this test find vulnerabilities that require immediate attention.