Zscaler Blog

Get the latest Zscaler blog updates in your inbox

News & Announcements

Cybersecurity spending soars - This week in cybersecurity

August 17, 2017 - 2 min read

Game of Thrones secrets revealed as HBO Twitter accounts hacked

Several HBO Twitter accounts were hacked and taken over by the notorious OurMine hacking group, posting #HBOHacked messages and warnings about security. Read more.

How a one man hacking operation was able to infiltrate international firms

A newly uncovered cyber attack that targeted more than 4,000 organizations in the oil and gas, mining, construction, and transportation sectors has been found to have been carried out by a 20-year-old man in Nigeria. Read more.

Bank-fraud malware not detected by any AV hosted in Chrome Web Store. Twice.

A researcher has uncovered an elaborate bank-fraud scam that's using a malicious extension in Google's Chrome Web Store to steal targets' passwords. Read more.

Petya ransomware: Cyberattack costs could hit $300m for shipping giant Maersk

Maersk, the world's largest container ship and supply vessel operator, reports that they may lose up to $300 million in revenues for 2017 due to the effects of the Petya ransomware attack. Read more.

Global cybersecurity spending to grow 7 percent to $86.4 billion in 2017

Gartner is projecting that worldwide spending on IT security products and services will grow 7 percent, year over year, to reach a total of $86.4 billion in 2017. Read more.

Uber agrees to 20 years of privacy audits after FTC says it 'failed consumers'

More than 100,000 names and driver's license numbers were stolen in a 2014 data breach of Uber's database, operated by Amazon Web Services. The Federal Trade Commission said the company could have made low-cost attempts, like using multi-factor authentication, to prevent the breach. Read more.

Microsoft PowerPoint used as attack vector to download malware

A vulnerability in the Windows Object Linking Embedding (OLE) interface is being exploited by cybercriminals through Microsoft PowerPoint in order to install malware. Read more.

Explore more Zscaler blogs

A cyber criminal shopping for malware
Agniane Stealer: Dark Web’s Crypto Threat
Read Post
Business people walking through a city
The Impact of the SEC’s New Cybersecurity Policies
Read Post
Digital cloud illuminated in blue
Security Advisory: Remote Code Execution Vulnerability (CVE-2023-3519)
Read Post
The TOITOIN Trojan: Analyzing a New Multi-Stage Attack Targeting LATAM Region
Read Post
01 / 02
dots pattern

Get the latest Zscaler blog updates in your inbox

By submitting the form, you are agreeing to our privacy policy.