Corporate Blog

News and views from the leading voice in cloud security.


By: Anthony Gil

Burrito buyers beware | This week in cybersecurity

Too busy working to keep up with cybersecurity news this week? Here’s a round-up of the top stories from the cyberscape.

Chipotle says its payment system may have been hacked Chipotle may have been the target of a data breach. Chipotle is investigating credit card transactions made from March 24 through April 18 with cyber security firms, law enforcement and its…
By: Matt Piercy

Mind the Gap

The sheer number of IT departments that are not acknowledging the numerous security gaps for cyber-attackers to exploit is astonishing. The problem is that many of those within the industry believe they have their security posture under control but they…
By: Anthony Gil

Ransomware starter kits? | This week in cybersecurity

Too busy working to keep up with cybersecurity news this week? Here’s a round-up of the top stories from the cyberscape.

Russian hacker creates starter pack ransomware service Researchers have discovered a new highly customized piece of ransomware dubbed Karmen that allows them to distribute it as a service to non-technical cyber criminals. With this new ransomware-as-a-service (RaaS), attackers can remotely…
By: Mike Ruiz

To inspect or to not inspect SSL: Why is this even a question?

Over half of the Internet today uses SSL (TLS) to encrypt traffic between your application and the server on the internet.  By the end of 2016, 80% of all traffic across Google properties was encrypted, and here at Zscaler, between…
By: Anthony Gil

Amazon accounts hacked! | This week in cybersecurity

Too busy working to keep up with cybersecurity news this week? Here’s a round-up of the top stories from the cyberscape.

Amazon s Third-Party Sellers Hit by Hackers Hackers are targeting the growing population of third-party sellers on Amazon, using stolen credentials to post fake deals and steal cash. Hackers have gone into active seller accounts and changed the bank-deposit information…
By: Mathias Widler

How to choose a sandbox

Grab a shovel and start digging through the details

Businesses have become painfully aware that conventional approaches virus signature scanning and URL filtering are no longer sufficient in the fight against cyberthreats. This is in part because malware is constantly changing, generating new signatures with a frequency that far outpaces…
By: Anthony Gil

Top 7 Cybersecurity Stories This Week 04-07-2017

Too busy working to keep up with cybersecurity news this week? Here’s a round-up of the top stories from the cyberscape.

CIA operations may be disrupted by new Wikileaks' data release WikiLeaks latest disclosure of CIA cyber-tools reveals a technique used by the agency to hide its digital tracks, potentially blowing the cover on current and past hacking operations aimed at…
By: Mark Ryan

It’s not the printer…it’s the ink

Everyone knows the adage while printer manufacturers might make a little money on their hardware, it s the ink that brings in the big profits. The same concept applies to razors and razorblades. And, it turns out it s also…

Learn more about Zscaler.
Join one of our webcasts.

Check how healthy is your Internet security with Security Preview, Zscaler's free security scan

How secure are you?

Check your security with our instant risk assessment, Security Preview. It’s free, confidential and safe. 85% of companies who run this test find vulnerabilities that require immediate attention.