News

2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008
March 17, 2017

Punit Minocha, Zscaler VP for business development, said: “This joint effort brings together Zscaler’s ability to provide high-performance, cloud-delivered internet security with Barracuda’s experience in the small and midsize market to provide comprehensive security that is easy to deploy at an affordable price.”

March 16, 2017

“Security tends to be a very compute-intensive operation,” observes Punit Minocha, Zscaler’s vice president of business development. “Given that our security is done in the cloud, the end customer no longer has to make a trade-off between security and performance.”

March 16, 2017

“Irrespective of where data resides, businesses cannot outsource responsibility. So, as more third party cloud services are adopted, this management of the supply chain must be considered. Especially as the EU GDPR age promises excruciating fines for those who cannot comply," said Chris Hodson, EMEA CISO at Zscaler

March 16, 2017

“Zscaler Inc., a San Jose, Calif., cloud-security company, has appointed Karen Blasing to its board of directors. Besides her role as independent director, Ms. Blasing will chair the board’s audit committee. The move follows the appointment of Remo Canessa as chief financial officer in February.”

March 16, 2017

“Now that criminals have the capacity to wreak havoc by hosting malware and injecting code through malvertising, we've reached a tipping point where all traffic must be treated as suspect, with every byte subject to the same scrutiny. There's now no excuse not to prioritise SSL encryption, especially when platforms exist that can scale to meet this demand without adding latency," said Chris Hodson, EMEA CISO at Zscaler.

March 15, 2017

“‘Exploit kits still pose a significant threat. There is nothing new about exploit kit authors hiding their activities and frequently changing tactics,’ Deepen Desai, senior director of research and operations at Zscaler said. ‘There is no reason to believe we won’t see a resurgence of exploit kits in the future. The question is when.’”

March 10, 2017

"Zscaler is embracing an innovative approach to help enterprises transform and simplify their network infrastructure and provide fast and secure access to applications, whether they are on the corporate or cloud. As the SaaS landscape has changed dramatically in recent years, companies are struggling with increased network and security complexity and have a strong need for a new security approach, "said Aleksandra Verhoeve, explaining their decision to move to Zscaler.

March 10, 2017

We have seen new RIG gates and landing pages hosted in South America, Southeast Asia, and Australia. Previously, RIG hosts were mainly limited to Western Europe, North America, and Russia. These new hosts indicate an effort to increase the target demographics and potential victim pool worldwide for RIG-distributed ransomware.

March 09, 2017

Microsoft Office 365 has been widely praised for its ability to improve collaboration and productivity. But those benefits are quickly undone by poor performance, which is a major problem for Office 365 users in regional and branch offices. In these environments, traffic is often backhauled to centralised resources over MPLS links before it can go out to the Internet and connect to Office 365. Then the traffic from Office 365 takes the same circuitous route back to the user. It all leads to frustrating latency and high costs.

March 02, 2017

As companies discover the benefits of the cloud in terms of agility, productivity, and cost, organizations are increasingly embracing cloud applications and infrastructure services. Thus, global spending on the public cloud is expected to total $ 216 billion by 2020. But what about security? The Cloud Rush has highlighted the limitations of existing security systems as threats become increasingly strong. 

February 24, 2017

Zscaler reported that the iSpy keylogger malware gets onto an endpoint when end users open a malicious attachment in a spam or phishing email, from which the main iSpy malware is downloaded onto the system.

February 23, 2017

We are approaching new problems with the same old solution,” said William Harmer, a senior director at Zscaler, a cloud security company. “We are coming at it from the perimeter, the corporate stack, … in a world that’s become mobile, where the network is irrelevant and the perimeter is porous.

February 23, 2017

So while the potential of AI for security is exciting – it remains a work in progress and by no means presents an imminent threat to skilled workers or deserves the bad reputation it has gained of late.

February 21, 2017

Attacks on IT via devices on the Internet of Things (IoT) have reached a new dimension. Similar to "Code Red" and "Nimda" about 15 years ago in the software environment, the hardware industry is now in the thread cross. At the end of last year the botnet "Mirai" with several attacks against different web services a pretaste on what the Industry.

February 17, 2017

Sinha explained how Zscaler is enabling a better security model for cloud-first workloads. “We want to sit between users and the destinations that they go to all across the world,” he said.

February 17, 2017

“Zscaler had the best booth in terms of allowing attendees to relieve a bit of aggression. Taking a very literal approach to data destruction, Zscaler supplied an arsenal of destruction tools to eviscerate hard drives. With hammer in hand, attendees hacked away, splintering dated data to smithereens.”

February 16, 2017

“If you want to introduce cloud computing in your company, you need a clear strategy, which also takes account of network infrastructure, remote access and Internet security. Read about how "clouding" succeeds in practice.”

February 16, 2017

“The main hurdle with “cloudification” is that network infrastructure has to be taken into consideration as well as security to ensure consistent user experience, when accessing cloud-based apps. Teams can’t just strengthen the hardware they’ve already got at a few internet gateways.”

February 15, 2017

“Businesses need to be careful when selecting a technology supplier. A wrong choice could lead to a false sense of security, more chaos and disastrous consequences,” he warned.

February 15, 2017

I don’t think enterprise were particularly well prepared for [the cloud]. I think now there’s this rush to move everything into the cloud. But networking teams were ill prepared; it’s crushing their network because they have all this new internet traffic. Security teams are scrambling because now they have to secure data in locations they don’t own and control.

February 15, 2017

Life was good when your users and your data were inside the network perimeter, but mobility in the cloud happened and your users moved out and your applications moved to the cloud, yet organizations are still building a perimeter around a network where the data no longer sits.

February 15, 2017

Office 365 is one of the number of apps to lead the confines of the data center to move to the cloud. For those of you who were at Microsoft’s night conference in September, the new recommendation for an optimal deployment was to go direct to the internet. So what they have realized is backhauling all the traffic across a traditional hub spoke architecture and going through some sort of centralized proxy could actually break Office 365. ​

February 14, 2017

“I have witnessed Zscaler’s momentum from the outside and I am thrilled to be joining the Zscaler team. Zscaler foresaw the massive growth in cloud services years ago, and I am convinced that Zscaler is unique in its ability to secure this transformation from the corporate data center to the cloud," Canessa said.

February 10, 2017

Ransomware has become a profitable business for the bad guys. We’re seeing numerous affiliate schemes where criminals are leasing ransomware infrastructure to other criminals and taking a percentage of the profits. This evidences the same service-based model we see in all industries. With this framework, the barriers to entry are lowered, and more criminals are turning to ransomware.

February 10, 2017

Cloud security startup Zscaler on Friday hired Remo Canessa as chief financial officer, tapping a person who has helped lead two big tech IPOs in the past. ​

February 10, 2017

Mr. Canessa said Illumio was a “great” company, but he felt Zscaler was a better fit given its momentum. Mr. Canessa’s hiring follows just weeks after the company announced technology industry veteran Charles H. Giancarlo would join its board. ​

February 08, 2017

“All over the world, Zscaler has seen the emergence of demand for cloud security causing a major transformation in IT business security operations from both startups to multiple multi-billion dollar industries - and Australia and New Zealand is no exception,” said Zscaler country manager for A/NZ, Sean Kopelke.

February 03, 2017

Based on today's data on malware, which is transported to the company via SSL-encrypted data traffic and the resulting threat potential, companies are doing well to expand their security strategy by legally compliant SSL scanning. It is important for the works council to collect and deal with concerns about data protection.

February 02, 2017

Chris Hodson, EMEA CISO at Zscaler, plays devil's advocate and points out that “decrypting traffic has a significant time, performance and cost impact and in some areas is simply not possible because the necessary cryptographic keys aren't available

February 02, 2017

Zscaler: Another security solution gaining traction in our network is Zscaler. It's focus on next-generation firewalls, sandboxing, SSL inspection, and vulnerability management has made it the cloud-based internet security company to watch in our network.

February 01, 2017

Android users must be more vigilant today than ever before and only deploy apps from legitimate Google and Apple application stores. We have identified examples of malware on these sites but a fraction of the likelihood," he told CNBC via email.

January 31, 2017

“Majority of these enterprises are based in Indian metros like Mumbai, Delhi, Bangalore, Chennai but they have branch offices across tier-2 and tier-3 cities,” he says. We have traditionally been in the business around the security controls which is a dire need across all verticals including pharma, ITES, retail, and manufacturing as per him.”

January 31, 2017

"Generally, when you go to business meetings, it's not for political talk," he said. "But I had a few business meetings today and every meeting would start with, 'So, America, you're closing down? You're going to build a wall around yourself?' I'm not sure we're gaining much from this. But we have a lot to lose. Every country out there used to look at America as a role model," he said. "This goes against our fundamental values. Reagan went to Berlin and said, 'Mr. Gorbachev, tear down this wall!' Now we've come full circle."

January 27, 2017

Watch out for the fake Netflix app, which could be spying on you — stealing your contacts, uninstalling apps and more. Zscaler came across this fake app, which turned out to be a new variant of SpyNote RAT (Remote Access Trojan). Read more.

January 27, 2017

"Android apps for Netflix are enormously popular [...] but the apps, with their many millions of users, have captured the attention of the bad actors who are exploiting the popularity of Netflix to spread malware," shared Shivang Desai, a researcher with Zscaler.

January 27, 2017

“The spyware in this analysis was portraying itself as the Netflix app. Once installed, it displayed the icon found in the actual Netflix app on Google Play,” Zscaler’s Shivang Desai explained in a blog post. “As soon as the user clicks the spyware’s icon for the first time, nothing seems to happen and the icon disappears from the home screen. This is a common trick played by malware developers, making the user think the app may have been removed. But, behind the scenes, the malware has not been removed; instead it starts preparing its onslaught of attacks.”

January 24, 2017

“Deepen Desai, Zscaler’s senior director of security research and operations, told Threatpost Tuesday that while researchers haven’t seen this particular RAT variant being spammed in the wild yet, they did see it on one of their threat feeds.”

January 24, 2017

“There were two interesting sub-classes found inside Main Activity: Receiver and Sender,” the blog said. “Receiver was involved in receiving commands from the Server and the main functionality of Sender was to send all the data collected to the C&C over Wi-Fi.”

January 24, 2017

“The spyware in this analysis was portraying itself as the Netflix app. Once installed, it displayed the icon found in the actual Netflix app on Google Play,” researchers explained, in an analysis. “As soon as the user clicks the spyware’s icon for the first time, nothing seems to happen and the icon disappears from the home screen. This is a common trick played by malware developers, making the user think the app may have been removed. But, behind the scenes, the malware has not been removed; instead it starts preparing its onslaught of attacks.”

January 20, 2017

“Security is fundamentally moving away from the box-based approach," Mr. Chaudhry said. "It’s almost like moving from individual power generators in homes to power plants.”

January 19, 2017

Technical expertise in the protection of critical data and infrastructures must be accompanied by a Chief Information Security Officer (CISO), as well as leadership skills, in order to be responsible for the management strategies. Employee mobility, digital transformation, increasingly intelligent attack scenarios, and legal requirements on data protection must be brought into line with the protection strategy in order to successfully counteract opportunistic attacks as well as industrial pioneering.

January 16, 2017

“The DroidJack RAT is another example of a growing trend in which malware authors seek to exploit public interest as a way to spread malware. In this case, like others before, the event of a popular game release became an opportunity to trick unsuspecting users into downloading the RAT. As a reminder, it is always a good practice to download apps only from trusted app stores such as Google Play,” Zscaler concludes.

January 16, 2017

Zscaler researchers also reveal that the RAT is able to extract WhatsApp data from the infected devices. All of the gathered information is stored in a database and is then sent to the command and control (C&C) server.

January 13, 2017

They include the main sections of their suite -- Skype, Office, Xbox are all accessible -- but they don't have full integration. For example, clicking on Skype will just send you to you Skype and leave you there and clicking Office Trust Center will send you to the help page of the Office Trust Center," Harmer told SearchSecurity via email."While not ideal, this setup is better than nothing as it reminds you that you have different places to deal with privacy for each of the components.

January 12, 2017

Der Internet-Security-Spezialist Zscaler hat nun in seiner Security Cloud die Gefahrensituation untersucht, die von IoT-Geräten seiner Kunden ausgeht, deren Traffic durch die Zscaler-Cloud läuft. Die zweimonatige Analyse von August bis Oktober verfolgte darüber hinaus das Ziel herauszufinden, ob diese Geräte in die prominenten DDoS-Attacken dieser Monate involviert waren. Die Untersuchung konzentrierte sich vor allem auf die Faktoren Gerätetyp, genutzte Protokolle der Geräte, Lokation der Server mit denen kommuniziert wird und die Häufigkeit der In- und Outbound-Kommunikation.

January 11, 2017

Zscaler also reports about this modus, knowing that Android users are eagerly waiting for "Super Mario Run," the Trojan malware will attempt to present a fake web page promoting its release. Some details of the malware are cited in their report.

January 09, 2017

The malware targets all the financial apps on a users’ device. When they use them they are presented with a fake login screen that captures their details. In the Zscaler blog, Ghandi lists the finance apps the malware targets. It includes the Android apps from banks such as Société Générale, BNP Paribas, RBS, NatWest, Halifax, HSBC, TSB and Santander. All data gathered is sent back to a Command and Control (C&C) server where it is harvested and shared.

January 09, 2017

Due to the constantly evolving nature of the malware, Zscaler researchers have previously dubbed Marcher "the most prevalent threat to the Android devices" and the malware attacks all versions of Google's mobile operating system.

January 06, 2017

“Android Marcher has been around since 2013 and continues to actively target mobile user’s financial information," says Zscaler’s Viral Gandhi. "To avoid being a victim of such malware, it is always a good practice to download apps from trusted app stores such as Google Play. This can be enforced by unchecking the ‘Unknown Sources’ option under the ‘Security’ settings of your device.”

January 06, 2017

“While it may be the CIO’s responsibility to enact the requirements needed to achieve a secure environment, the CSO is ultimately responsible for enabling security," Harmer said. "CSOs must understand the requirements laid out by the CIO and are responsible for providing the most effective, easily integrated and cost-effective security solutions. Separation of CIO and CSO responsibility is fundamental and should be implemented by default.”

January 06, 2017

“Recently, ThreatlabZ came across a variant of Android Marcher Trojan disguised as the Super Mario Run app in one of our threat feeds,” the firm explained. “This malware scams users by presenting fake finance apps and credit card page in order to harvest banking details.”

January 06, 2017

Marcher is a sophisticated banking malware strain that targets a wide variety of banking and financial apps and credit cards by presenting fake overlay pages. Once the user's mobile device has been infected, the malware waits for victims to open one of its targeted apps and then presents the fake overlay page asking for banking details. Unsuspecting victims will provide the details that will be harvested and sent out to to the malware's command and control (C&C) server.

January 06, 2017

“Once the user's mobile device has been infected, the malware waits for victims to open one of its targeted apps and then presents the fake overlay page asking for banking details. Unsuspecting victims will provide the details that will be harvested and sent out to the malware's command and control (C&C) server" Zscaler says.