News

Zscaler in the media: research, information, and perspectives
2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008
December 31, 2015

Popular chat applications like WhatsApp tout encryption as a key feature and Apple’s iMessage app, which features end-to-end encryption and no central key store, is often referenced by law enforcement when arguing for a ‘back door’. In the coming year this battle will come to a head. While politicians used to dance gingerly around the topic given the privacy abuses exposed by the Snowden revelations, recent terrorist attacks have brought this issue front and centre. Multiple pieces of legislation are sure to be introduced that will propose weakened encryption protocols or procedures to grant law enforcement access to decrypted communications as needed.

December 28, 2015

By exploiting various social media websites, especially Twitter and Facebook, the cyber- criminals are presenting short web-links, similar as ones composed with bit.ly for accessing free software such as Avast anti-virus and WhatsApp, or coupon vouchers, the security company states. Reportedly, an enormous number of visitors following the web-links browsed Facebook, thus reported itworldcanada.com dated December 22, 2015.

December 28, 2015

Zscaler

$1.05 billion valuation

Cloud Internet security

December 27, 2015

Terror organizations are continually searching for new avenues to instill fear and require significant funding to fulfill their hateful agendas. Skilled hackers can aid on both fronts. Cyberattacks can clearly be used by terrorists to obtain intelligence for future attacks and we’re already seeing early signs of cyberattacks being used to cause physical damage. Last year, hackers caused significant damage to a German steel mill when they disabled systems responsible for controlling a blast furnace.

December 24, 2015

Associer des plateformes de sécurité intégrées et des options de déploiement dans le cloud est la clé d'une meilleure sécurité et d'une évolutivité accrue. C'est également le moyen de réduire les frais généraux et de déplacer des ressources vers des tâches critiques. Résultat, les RSSI doivent se demander comment apporter des améliorations sensibles au niveau des coûts. Cette définition des priorités se reflète dans les conclusions de l'enquête menée par Forrester auprès de 130 professionnels de la sécurité pour qui la réduction des coûts représente un objectif majeur — ainsi que le critère clé de l'adoption des technologies de sécurité dans le cloud.

December 23, 2015

Michael Sutton, CISO at Zscaler said: "Phishing and spear phishing have always provided a primary means of communicating with victims, but as our communication mediums evolve, so too will phishing tactics. We tend to think of email when we consider phasing attacks, but email is only one form of online communication and one that is on the decline in terms of usage. "We send and receive messages from a variety of applications and protocols from SMS to chat applications to social networks. Attackers recognise this and will continue to evolve and leverage alternate forms of communication for phishing attacks. Fortunately, some of these communication mediums aren't as wide open and easy to spoof as email is so we have some advantages when combating such attacks."

December 23, 2015

With almost all industries reliant on computerised systems, the potential attack surface is enormous and hacking has become extremely lucrative. The CrytoLocker ransomware authors for example were able to make millions in just a few short months. Such potential is surely in the sights of terror organisations, especially those such as ISIS, which have shown a new affinity for being tech savvy when it comes to recruiting and propaganda. Additionally, terrorists won’t need to acquire the required skills themselves as there are no shortage of cyber criminals all too willing to rent their skills out to the highest bidder and look the other way.

December 22, 2015

Cybercriminals are using the friendly face of Facebook and Twitter to distribute banking trojans that are specifically targeting Brazilians. The attackers are targeting Brazilian Portuguese-speaking users and are using social engineering tactics to trick them into downloading a Spy Banker Trojan, according to a Dec. 10 Zscaler blog post. The threat actors use the social media platform to push a shortened URL that promises the user coupons, vouchers, premium software downloads and even tax return services, but actually take the victim to a server hosted on Google's cloud service where Spy Banker is downloaded.

December 22, 2015

In July, another third-party Android app that performed premium SMS fraud was pulled from the Google Play store. The app, discovered by researchers at Zscalers, was disguises as a free version of BatteryBot Pro, a legitimate pay-to-use app for sale in the Google Play store.

December 22, 2015

Mit seinem Konzept passt die innovative Lösung von Zscaler perfekt in das Konzept des Kölner IT-Beratungshauses EBF GmbH, in dem die IT-Trendthemen Cloud und Mobility dominieren. Zscaler ist das führende Unternehmen im Bereich der Cloud-basierten Web Security Gateways. Seit fünf Jahren in Folge ist Zscaler ein Leader im Gartner Magic Quadrant „Web Security Gateways“. Der Security-Anbieter betreibt eine weltweite Sicherheits-Cloud in mehr als 100 Rechenzentren, die seine 5.000 Kunden mit deren 15 Millionen Mitarbeitern vor Cyberattacken schützt und zur Umsetzung von Unternehmensrichtlinien beiträgt.

December 22, 2015

Security awareness training usually focuses on the online communications people use most: Email. However, a recent malware campaign aimed at getting banking credentials of people in Brazil is a reminder that social media is also a vehicle for tricking employees. According to researchers at cloud security provider Zscaler, attackers are using Facebook, Twitter and other sites to offer short links (like those composed by bit.ly) to coupon vouchers and free software applications like WhatsApp and Avast antivirus. The overwhelming number of people who clicked on the links came from Facebook, the company said.

December 22, 2015

À une majorité écrasante (98%), les professionnels de la sécurité se déclarent convaincus qu'une plateforme de sécurité intégrée permettrait de déployer une large gamme de fonctionnalités de cybersécurité avec une efficacité supérieure aux solutions indépendantes fournies par différents éditeurs. En fait, 76% des personnes interrogées affirment que cette approche serait plus efficace. Une étude plus poussée montre que pour les professionnels, de telles plateformes éliminent les barrières qui empêchent la mise en œuvre de techniques de pointe telles que les fonctions analytiques avancées ou l'apprentissage automatique (machine learning), qui reposent sur la distribution d'un grand volume de données cohérentes, toutes technologies confondues.

December 20, 2015

There's lots of tricks and traps out there. Researchers at Zscaler discovered a malicious smartphone app that posed as Amazon but was actually trying to steal data. The app did its dirty work after users thought they'd already deleted it. That's just one example. A whopping 40 percent of each year's online fraud happens during October, November and December.

December 20, 2015

Zscaler security researchers recently uncovered a smartphone app that looks and acts like the real Amazon application but is nothing more than an attempt to defraud unsuspecting consumers. What is even more worrying is how this app did most of its handiwork after users attempted to delete the malicious software from their device. While it is good to see reports surfacing regarding this particular application, it represents only the tip of the iceberg. Considering how 40 percent of all online fraud takes place during Q4 of each year, consumers have to be more careful with their financial details. Some deals may appear too good to be true, and in most cases, they are nothing more than a trap to steal information.

December 19, 2015

Zscaler

Valuation: $1 billion. 

Founded: 2008. 

What it does: Internet security company Zscaler uses cloud computing to provide services like firewalls and IoT security. 

December 19, 2015

PII is highly sought after in the underground as it can be leveraged to commit financial fraud such as applying for credit, filing false medical/insurance claims or fraudulent tax refunds. Whereas credit cards can be easily canceled, changing one’s name, address and social security number generally isn’t an option, so the stolen data remains valuable for a longer period of time. In 2016, attackers will increasingly target sectors known to store bulk PII including finance, healthcare and government entities to harvest valuable PII.

December 17, 2015

The cloud application security company announced a $100 million round in August, with TPG leading the round, and followed that up about six weeks later with news of a $25 million investment from Google Capital.

December 16, 2015

In a report published last week, the San Jose, Calif. security vendor's ThreatLabZ research division showed how Spy Banker Trojan's authors used Google's cloud to host the initial downloader for the malware. The report also states that the malware campaign, which is targeting Portuguese-speaking users in Brazil, is using social engineering attacks on Facebook, Twitter and other social networking sites to entice unsuspecting users to click on the malicious links for the Spy Banker Trojan downloader. Once the downloader is installed, the Spy Banker Trojan Telax malware steals the online banking credentials of infected users.

December 16, 2015

Regionalized services can be deployed in private regional network hubs, owned and operated by the enterprise. For companies that would rather outsource this altogether we are seeing the emergence of security-as-a-service offerings such as Zscaler (which has of order 100 regional hubs), or Unified Communications-as-a-Service (UCaaS) offerings from the likes of Orange Business Services, 8X8, HP and others.

December 14, 2015

Traditional on-premise infrastructure that is cumbersome, expensive and difficult to support and maintain is being reimagined through the cloud, but many organizations still hesitate to move to the cloud. Why? Enterprises perceive problems they believe the move could incur—including security issues, complicated reconfiguration.  But businesses must take advantage of the cloud in order to keep pace with a rapidly evolving market.

December 14, 2015

Terrorists target critical infrastructure: This prediction is one that saddens me to write, but I feel this threat is inevitable and one that can't be ignored. We know that terror organizations are continually searching for new avenues to instill fear, but we also know that they require significant funding to further their hateful agendas. Unfortunately, skilled hackers can aid on both fronts. Cyber-attacks can clearly be used by terrorists to obtain intelligence, and we're already seeing early signs of cyber-attacks being used to cause physical damage through targeting critical infrastructure.

December 13, 2015

Security researchers with Zscaler ThreatLabZ reported a new malicious campaign targeting users in Brazil. On this malicious attack cybercriminal are using a new version of Spy Banker Downloader Trojan that is distributed over social networks specifically Facebook and Twitter.

December 12, 2015

Zscaler notó que los usuarios también son atraídos al archivo malicioso de la plataforma en la nube de Google desde varios sitios web alojados por GoDaddy. El gigante de hosting ha cerrado los dominios peligrosos y Google ha eliminado el archivo PHP de sus servidores. Los atacantes han engañado a los usuarios para que hicieran clic en los enlaces maliciosos prometiéndoles vales y diversas aplicaciones, tales como productos de seguridad de WhatsApp y Avast. Esta táctica es aparentemente muy eficaz ya que las estadísticas dicen que se ha hecho clic en el enlace de Bit.ly malicioso más de 100.000 veces, sobre todo en Facebook.

December 11, 2015

Zscaler ThreatLabZ has been closely monitoring a new Spy Banker Trojan campaign that has been targeting Portuguese-speaking users in Brazil.

December 11, 2015

The final payload, Spy Banker Trojan Telax, is capable of stealing the banking credentials of users. The payload also checks for the existence of virtual environments such as VMWare or VirtualBox and includes 32-bit and 64-bit rootkits, which can obtain more persistence on users’ machines. Zscaler researchers said that the Spy Banker Telax trojan uses no vulnerability exploits, instead relying only on social engineering to infect users.

December 11, 2015

Эксперты лаборатории Zscaler ThreatLabZ сообщили о новой вредоносной кампании, направленной на пользователей в Бразилии. В ходе кампании злоумышленники распространяют новый вариант банковского трояна Spy Banker через социальные сети, в основном Facebook и Twitter. В качестве хостинга используются серверы Google Cloud.

December 11, 2015

Zscaler通过bit.ly短网址获取到了一些统计数据,并发现99%的用户访问均来自巴西。这表 明该组织的木马计划非常完善且卓见成效。 该木马团队在10月19日到10月30日期间相当 活跃,不过Google很快清理掉了托管在其云服务上的恶意文件。 至于流量的源头,99%来 自Facebook,但也有少数几千个链接来自独立域名,其中多个均以来自Emas的Kleyb Maxbell这个名字命名(巴西城市)。

December 11, 2015

One of the best anti-virus solution was disguised malicious links among security company avast free software (Avast) Free Software and coupons, etc. were also included. Trojans are equipped with the information deodorization function. Users must check the environment of the device itself. Otherwise, once infiltrated Trojan can be exploited later to send their C & C servers to steal information about users' anti-virus solution on your device.

December 11, 2015

Zscaler has identified a new Spy Banking Trojan which is using Google Cloud Servers, and targeting Portuguese speakers in Brazil. The cyber security firm says that Google Cloud Servers are used to host the initial Spy Banker Downloader Trojan, which then installs the Spy Banker Trojan Telax. The attackers are luring users to download and install the malicious payload via social engineering techniques, offering coupon vouchers and software like popular messaging app WhatsApp, and antivirus software tool Avast.

December 11, 2015

It is not just Google Cloud servers that are being used for this. Zscaler lists five websites it says are involved in distributing the malware. At the time of writing, GoDaddy has repossessed four of the sites and deactivated them. The last site has been registered by a user that Zscaler names as kleyb maxbell. That same user apparently has another domain that is redirecting users to a Google Cloud Server that was serving up the malicious payload.

December 11, 2015

“Zscaler ThreatLabZ has been closely monitoring a new Spy Banker Trojan campaign that has been targeting Portuguese-speaking users in Brazil. The malware authors are leveraging Google Cloud Servers to host the initial Spy Banker Downloader Trojan, which is responsible for downloading and installing Spy Banker Trojan Telax.” states the post published by Zscaler.

December 11, 2015

Die Studie „The Necessity of Cloud-Delivered Integrated Security Platforms“ von Forrester Consulting sieht einen Cloud-Ansatz für IT-Sicherheit im Vorteil gegenüber traditionellen On-premise-Security-Appliances. Die befragten Sicherheitsexperten sind mehrheitlich davon überzeugt, dass integrierte Plattformen umfangreichere Sicherheit bereitstellen als Punktlösungen. Cloud-basierte Sicherheit unterstützt Unternehmen aller Größen dabei, Internet-Security, Schutz vor Advanced-Persistent-Threats, SSL-Scanning und Bandbreitenmanagement mitsamt der Verwaltung von Richtlinien, Sicherheits-Assessments und -Intelligenz hochintegriert umzusetzen."

December 10, 2015

The Trojan has some stealthy capabilities. To stay out of the hands of security pros, one of the first things it does is check a machine for the presence of a virtual environment. It collects information about the anti-virus software running on the host machine and sends it back to the command-and-control server. It also contains both a 32-bit rookit and 64-bit rookit component.

December 10, 2015

Zscaler was able to obtain statistics about the bit.ly URL used in the campaign, and found out that 99% of the users that accessed it came from Brazil. This shows the group had a well- thought plan for distributing the trojan to its victims and was very efficient at it.

December 10, 2015

Zscaler’s report, published today, shares one example where the bit.ly link points to a PHP files that’s hosted on a Google Cloud server. The PHP file then does a 302 redirect to download the first stage of the attack, the downloader. The executable, in this case, poses as a link to Brazil’s online federal tax return service, but others pretend to be anything from free antivirus software, WalMart, WhatsApp. Zscaler said this particular bit.ly link had been clicked more than 103,000 times from the time it surfaced Oct. 20 through Nov. 30—and 102,000 of those links came from Facebook.

December 10, 2015

Expect ransomware to become increasingly corporate focused in 2016 and as it does, enterprises won’t get away with paying consumer rates. The criminals behind the ransomware campaigns are savvy and once they realize that they’ve locked up source code and financial documents that haven’t been properly backed up, you can expect prices to skyrocket…and be paid.

December 08, 2015

Regionalized services can be deployed in private regional network hubs, owned and operated by the enterprise. For companies that would rather outsource this altogether we are seeing the emergence of security-as-a-service offerings such as Zscaler (which has of order 100 regional hubs), or Unified Communications-as-a-Service (UCaaS) offerings from the likes of Orange Business Services, 8X8, HP and others.

December 07, 2015

“With the consumerisation of IT, it is no longer realistic for the networking or security departments to block access to resources without offering alternatives,” says Sutton, CISO at Zscaler “CISOs should take note of employee behaviour, identify their needs and seek to provide solutions that empower users in a way that is acceptable within the confines of overall corporate risk.”

December 06, 2015

Jay Chaudhry, presidente ejecutivo de la compañía de servicio en la nube Zscaler, puntualizó que las universidades de alto perfil en Estados Unidos contratan ahora más directores de seguridad de información. Pero advirtió que es posible que todavía se necesite una gran brecha de seguridad para que el sector le dé prioridad al tema.

December 04, 2015

According to Citrix’s Karl Brown, SD-WAN targets key capabilities like real-time provisioning and configuration that organizations require between main offices, branches, partners and other remote sites. These are supported by SDN-facing virtualization and optimization layers, coupled with secure Internet access and interoperability with third-party infrastructure. To that end, the company is developing its CloudBridge platform as an end-to-end solution by integrating tools like the ZScaler Security as a Service offering and fostering interoperability with orchestration vendors like Glue Networks.

December 01, 2015

Ein Beispiel dafür sei Zscaler. Dieses Unternehmen bietet Hughes zufolge „Security-as-a- Service“-Leistungen über 100 regionale Hubs an. Vergleichbare Dienste im Bereich „Unified Communications as Service“ (UCaaS) würden z.B. Orange Business Services, 8x8 und HP zur Verfügung stellen. Auch Cloud-Service Provider wie Microsoft mit Azure, Amazon Web Services und Rechenzentrumsbetreiber wie Equinix hätten Hubs in Regionen wie Deutschland aufgebaut. Solche Network Hubs ermöglichten es Unternehmen, SD-WANs aufzubauen. Diese Weitverkehrsnetze würden nicht nur die Unternehmensstandorte umfassen, sondern auch den Zugang zu Cloud-Diensten wie Software-as-a-Service und Infrastructure-as-a-Service ermöglichen.

December 01, 2015

There is no doubt that it is becoming increasingly difficult to detect and block malware leveraging traditional signature-based security controls, such as antivirus - this being a point that Michael Sutton, CISO, Zscaler, takes up. "Signature-based solutions suffer from the fact that they must have previous knowledge of the threat, in order to detect it," he states. "If the threat is new, a signature doesn't yet exist and the malware will succeed in infecting its target. Malware authors are all too aware of this and continually mutate malicious apps to ensure that they will bypass the latest signatures.

November 30, 2015

The rush to save money on Black Friday and Cyber Monday are a prime opportunity for fraudsters. In one example uncovered by security researchers at Zscaler, an application designed to look like the official Amazon one, but which does not work so well, was able to delve deep into your device after being installed and run. Unfortunately, uninstalling the application does not solve the issue. One of the reasons why there is a significant jump in online fraud is because there is a significant jump in online transactions – Cyber Monday’s online transactions are estimated to top $2.5 billion in the US.

November 30, 2015

"Names, email addresses, hashed passwords and home addresses were stolen in the VTech breach, which could be used in subsequent phishing and social engineering attacks," Zscaler Chief Information Security Officer Michael Sutton told eWEEK. "While the passwords were hashed in the database, they can easily be exposed via a dictionary attack, and affected consumers should, therefore, consider them to be compromised and change authentication credentials at any other sites where the same passwords have been used."

November 29, 2015

You open it up and it looks like a copy of Amazon, but it doesn't work very well. Frustrated, you delete it. Problem solved, right? Not so fast. The malicious app has already gotten its claws into your phone, collecting your personal information. Discovered by security researchers at Zscaler, this is real. It's one of many attempts hackers and fraudsters will make to take advantage of your zeal for deals. Cyber Monday, the annual online shopping spree after Thanksgiving weekend, might seem like a dream come true. Who wouldn't love all those deals? But there's someone else who might be even happier than you are about that discount e-reader or smartwatch. That would be criminals.

November 29, 2015

You open it up and it looks like a copy of Amazon, but it doesn't work very well. Frustrated, you delete it. Problem solved, right? Not so fast. The malicious app has already gotten its claws into your phone, collecting your personal information. Discovered by security researchers at Zscaler, this is real. It's one of many attempts hackers and fraudsters will make to take advantage of your zeal for deals. Cyber Monday, the annual online shopping spree after Thanksgiving weekend, might seem like a dream come true. Who wouldn't love all those deals? But there's someone else who might be even happier than you are about that discount e-reader or smartwatch. That would be criminals.

November 28, 2015

Patrick Foxhoven, CTO of Emerging Technologies at ZScaler, explains, “More often than not, IoT devices are developed by companies with a different mindset – they think about user experience before security or compliance. These devices increase the attack surface of a network, and IT needs to put a plan in place to secure them.”

November 27, 2015

The security firm Zscaler Research first discovered the app, which the company says is designed to steal your personal information. When installed, the app apes the look of the Amazon icon to really sell the con.

November 27, 2015

A fake Amazon app can download your information and send it to hackers, even after it has been uninstalled. Internet security company Zscaler discovered a fake Amazon app that promised deals. When you download the app, it gains access to your messages, browser history and contact information. It can still download information when you think it’s un-installed.

November 27, 2015

En concreto, la firma Zscaler ha detectado una peligrosa campaña de malware que funciona a través de aplicaciones maliciosas de Android, que tratan de engañar a los usuarios que busquen ofertas para el Black Friday o el Cyber Monday.

November 27, 2015

Security firm Zscaler Research discovered a firmware that allegedly offers consumers an early access to Black Friday and Cyber Monday deals. Disguised as "Amazon.com Black Friday deals app," the said malware will collect personal data from a user who downloads the app. Consumers can be caught unaware as the said malware has used "cyber squatting" in order to portray the site as legitimate.

November 27, 2015

A fake Android app has been making the rounds on the Internet, sporting the well-known Amazon icon. It's designed to steal users' personal information, accessing a device's call logs, contact details and text messages. To steer clear of this one, don't install any similar app from a third-party source. Once this app is installed, it can't be deleted easily, as a hidden secondary app will remain to wreak havoc on the device. "This newly loaded app will first register itself as a service. Even if we remove the fake Amazon app, the 'com.android.engine' app will stay persistent and keep doing its activity in the background," Zscaler Research, which discovered the information-stealing app, says.

November 27, 2015

Cyber security experts say hackers are pulling out all the stops to try and trick consumers and steal their information. One security firm says they discovered a fake app embedded in an e- mail link advertising exclusive sales to Android users on Amazon.com. "Effectively, you're installing a Trojan horse on your phone," Michael Sutton from Zscaler cyber security firm said.

November 27, 2015

Malware that one company says is disguised as an android app supposedly offering early access to Amazon.com deals. Cybersecurity firm Zscaler said they discovered the impostor. Zscaler said hackers could use your phone to make money by programming your phone to call or text premium 800 Numbers, since the hackers register those Numbers. Zscaler says some of the money goes straight to the hackers.

November 26, 2015

Zscaler warns users to, "Always install applications from legitimate app stores and websites. Be aware of the permissions asked by the application during installation. Shopping apps should not be asking for access to your contacts or SMS".

November 26, 2015

While a user can simply delete the illegitimate Android Amazon app, the com.android.engine will remain in the device until the app is found. What makes removing the sneaky app difficult is that the com.android.engine malware has no icon included. Zscaler Research is not entirely sure why someone would want the personal information of others using a fake Amazon app, but the security firm noted that people could use the data for ransom.

November 26, 2015

Zscaler said, “While consumers eagerly await the chance to buy this season’s hottest gifts, what they don’t realise is that hackers are also anticipating a holiday treat: their personal data. The app was masked as an Amazon.com Black Friday deals app, but actually intended to collect victim’s personal data. The malware authors are using cyber squatting to fool the victim and portraying itself as a legitimate Amazon site.”

November 26, 2015

According to a post published by the Zscaler research team, the fake app is being distributed from a URL set up by the malware authors to fool victims into believing it is a legitimate Amazon site.

November 26, 2015

It's obvious that the malicious app's makers are targeting Amazon users familiar with the Amazon Underground app, but who may not be savvy enough to tell the difference between it and the malware

November 26, 2015

De acordo com um post publicado pela equipe de pesquisa da empresa Zscaler, o falso app está sendo distribuído a partir de uma URL criada pelos autores do malware para enganar as vítimas e levá-las a acreditar que é um site legítimo da Amazon. Como Yahoo! Tech descreve, o app de algumas formas se parece muito com a aplicação real Amazon Underground, que oferece jogos e aplicativos gratuitos.

November 26, 2015

El consejo de Zscaler es útil: “Instalad siempre aplicaciones desde los sitios oficiales. Y desconfiad de toda aquella app que te pide acceso a información privilegiada sin motivo”.

November 26, 2015

Zscaler empfiehlt Anwendern, Apps in der Vorweihnachtszeit nur aus offiziellen Quellen wie Google Play zu installieren und auch sehr vorsichtig zu sein, wenn eine Shopping-App zum Beispiel Zugriff auf die persönlichen Kontakte oder SMS verlangt.

November 25, 2015

The security firm Zscaler Research first discovered the app, which the company says is designed to steal your personal information. When installed, the app apes the look of the Amazon icon to really sell the con. Once you open the app, Zscaler says, it will launch a completely different app called com.android.engine. That will then ask you to grant the malware a slew of special permissions, including the ability to see your text messages, call logs, and contact information, as well as to send texts and make calls. It can even view your Web browser’s history.

November 25, 2015

“Especially during this shopping season, consumers need to be aware of the applications they’re downloading and stay away from such fake apps,” Zscaler warns. “Always install applications from legitimate app stores and websites. Be aware of the permissions asked by the application during installation. Shopping apps should not be asking for access to your contacts or SMS. Keeping an eye on the permissions used by the app can save you from installing such fake apps.”

November 25, 2015

The advice is simple – always install applications from legitimate sources such as the Apple App and Google Play stores. Be aware of the permissions asked by the application during installation. Keeping an eye on the permissions used by the app can save you from installing such fake apps.

November 25, 2015

In a matter of years, we’ve seen Black Friday and Cyber Monday become two of the most anticipated days of the calendar year. While consumers eagerly await the chance to buy this season’s hottest gifts, what they don’t realize is that hackers are also anticipating a holiday treat: their personal data. This weekend, Zscaler uncovered a campaign where malware turning the holiday shopping season into an opportunity to scam large number of people by creating fake apps offering early access to Amazon.com Black Friday and Cyber Monday offers and deals.

November 25, 2015

A terrifyingly Android app, which looks surpringly legitimate and claims to offer early access to Amazon's hugely popular Black Friday 2015 Lightning Deals, is being shared online. But rather than unlock killer online bargains, the unofficial Android shopping app just steals customers' personal details, security experts Zscaler has warned.

November 25, 2015

Zscaler says, ‘Always install applications from legitimate app stores and websites. Be aware of the permissions asked by the application during installation. Shopping apps should not be asking for access to your contacts or SMS. Keeping an eye on the permissions used by the app can save you from installing such fake apps.’

November 24, 2015

Brown comes to Zscaler with over 30 years of experience in the information and financial technology industries, and his strategic insight will be key as Zscaler continues to evolve as a cloud security leader.

November 24, 2015

The trend of using adult-themed Android apps to deliver malware is ramping up, as Zscaler security researchers are warning about two new such threats that have recently appeared on the market, both with low detection rates on virus scanning systems like VirusTotal.

November 24, 2015

"[Around] 30% of Internet traffic is in some way related to pornography and this is the primary reason why malware authors are using porn apps to infect large numbers of users," a representative of Zscaler said in a statement to IBTimes UK. "During recent data mining, we noticed an increasing volume of mobile malware using pornography (disguised as porn apps) to lure victims into different scams and stealing personal data or locking phones and demanding ransom payments."

November 24, 2015

“We are seeing an increasing number of adult themed Android malware apps using pornography to lure victims,” the report notes, before adding “To avoid being a victim of such malware, it is always best to download apps only from trusted app stores, such as Google Play.”

November 24, 2015

“We are seeing an increasing number of adult themed Android malware apps using pornography to lure victims. To avoid being a victim of such malware, it is always best to download apps only from trusted app stores, such as Google play,” Zscaler explained in an advisory message.

November 24, 2015

“We are seeing an increasing number of adult themed Android malware apps using pornography to lure victims,” Zscaler noted. “To avoid being a victim of such malware, it is always best to download apps only from trusted app stores, such as Google Play. This can be enforced by unchecking the ‘Unknown Sources’ option under the security settings of your device.”

November 24, 2015

The cloud security platform raised a $100 million B round in August to help build out its technology. That makes for a total of $138 million in cash and tips it to unicorn status at $1.1 billion in value.

November 24, 2015

Says Brown of discussions with Zscaler’s CEO Jay Chaudhry, “We agreed that if the future was going to be the cloud, then security and policy management would have to move to the cloud. I’ve been convinced of that since the Salesforce implementation, but there were no vendors around to make that easy.”

November 24, 2015

Zscaler安全研究人员已经发出安全警告,成人内容为主题的Android应用程序传播恶意软件的趋势正在加强,其中,两个新的威胁最近已经在市场上出现,并且被VirusTotal等病毒扫描系统检出的机率正在降低。Zscaler以前发现使用成人APP而感染的用户面临两个类似的威胁。其中一种是改变了设备的锁屏密码,采用随机密码进行解锁勒索。另外一种是偷拍用户照片,并且通过电子邮件进行勒索。

November 24, 2015

Η Zscaler ανακάλυψε δύο ακόμα περιπτώσεις moblie ransomware που μεταμφιέστηκαν ως πορνό εφαρμογές και έκλεψαν προσωπικά δεδομένα από κινητές συσκευές.

November 23, 2015

CRN reported last Thursday that Piercy is leaving his job as vice president for Northern EMEA for an EMEA-wide role at cloud security firm Zscaler. He will take on the new job in January.

November 23, 2015

The company has its technology installed across more than 100 data centers worldwide, providing customers with close proximity to its servers. It's among the fastest, most flexible SWGs on the market today. It also offers other security products that go beyond Web security on the same platform -- including antivirus, advanced threat protection and data loss prevention management. All of the applications are tightly integrated.

November 23, 2015

In complex IT environments today, the ability to see how each user, device and application accesses the corporate network is no longer a luxury but a necessity. The next generation of enterprise security solutions [is] based on direct network access to the cloud. This approach goes far beyond blocking threats. It ensures protection of critical security by allowing IT managers to regain control.

November 23, 2015

Cybercriminals are using increasingly hard-edged tactics to steal from phone users – with a new app scaring users by claiming they’ve been watching child porn… Zscaler researchers say, “The malware in this case is trying to scare the user with a warning screen accusing them of watching child porn. The malware steals victim’s personal data in background.”

November 23, 2015

“We are seeing an increasing number of adult themed Android malware apps using pornography to lure victims. To avoid being a victim of such malware, it is always best to download apps only from trusted app stores, such as Google Play,” [Zscaler] adds.

November 23, 2015

Of particular note for both SMS Trojan and Infostealer is that common mobile antivirus technologies were largely unable to actually detect either form of malware. Zscaler ran the SMS Trojan through the VirusTotal database of antivirus scanning engines, and only six out of 53 engines were able to detect the threat. For SMS Infostealer, the numbers are a little bit better, with 12 out of 53 antivirus engines finding the malware.

November 23, 2015

“That perspective, especially being on the bank side, has been very useful for us,” Chaudhry tells Fortune. “With Andy we get three perspectives: the customer perspective, the financial services perspective, and the CTO [chief technology officer] perspective.” …In terms of the company’s growth strategy, Chaudhry says he is looking to close deals with big banks in the coming months. “Financial services institutions have been slow to adopt cloud security because of the regulations and all,” he says, mentioning the strict rules that banks must comply with to secure their data and that of their customers. “That ball is moving at a faster pace now.” “I expect that out of the top seven to eight banks in the world, probably half will be our customers in the next 12 to 18 months,” he adds.

November 23, 2015

L’entreprise sans frontières intensifie les besoins en solutions de sécurité en mode Cloud. La nouvelle ère de l’IT a définitivement introduit un changement de dynamique professionnelle. Charles Milton, directeur de la distribution EMEA chez Zscaler, souligne les efforts des responsables de la sécurité des systèmes d’information pour sécuriser un réseau d’entreprise sans frontières.

November 22, 2015

安全公司Zscaler--一家提供基于云的扫描、监控通过互联网流量服务公司--发布的报告中显示:百分之九十八的受访者表示他们倾向于综合安全平台,因为其不仅提高了公司的安全性而且一定程度上节约了维护安全成本。

November 19, 2015

"[Zscaler] is ambitious and growing fast," he said. "My experience at VMware (and previously Citrix) lends itself well to a hyper-growth organisation. They prepare to one day be a public company [and] I have many years of experience in how that operates. All of that requires EMEA to make a major contribution - I'm familiar with that role and committed to the undertaking.

November 16, 2015

After all, as a new Zscaler-commissioned Forrester report finds, "The rapid and accelerating adoption of cloud computing, mobility, and the Internet of Things (IoT) — coupled with increasingly more sophisticated cyberthreats — has reduced the effectiveness of traditional appliance- and software-based security architectures."

November 13, 2015

“The biggest thing that we get is speed to deployment and stability,” says Graham, who joined the $18 billion company in September 2013. “No longer do I have to have a team that has to worry about upgrading the hardware or the OS, or fooling with any of that."

November 10, 2015

While security has typically been one of the biggest concerns when considering the move to cloud computing, it’s actually the cloud that should become the new security model as companies adopt the latest connected solutions like mobile apps and the Internet of Things (IoT).

November 10, 2015

Recently Forbes named the top 100 IoT startups. In the interest of brevity, we’ll take a look at the top 10.

November 10, 2015

According to Zscaler's Dhanalakshmi PK and Rubin Azad, “Nuclear EK remains a worthy rival to Angler EK, with widespread campaigns, regular exploit payload updates, new obfuscation techniques and new malware payloads. The end malware payload we saw in this campaign was the information stealing Kelihos bot which has extremely low AV detection.”

November 09, 2015

"Nuclear EK remains a worthy rival to Angler EK, with widespread campaigns, regular exploit payload updates, new obfuscation techniques and new malware payloads," said Zscaler researchers Dhanalakshmi PK and Rubin Azad. "The end malware payload we saw in this campaign was the information stealing Kelihos bot which has extremely low AV detection."

November 06, 2015

"A bot in the website of the International Council of Women (ICW) has been compromised by attackers using the Nuclear Exploit Kit—infecting users with the Kelihos bot. According to Zscaler, the EK was heavily obfuscated to evade security software detections."

November 04, 2015

While these attacks were not targeted in nature, this is the first instance where we saw EK operators leveraging a government site to target end users, Zscaler researchers said. One interesting observation is that we no longer see any Diffie-Helman POST exchange to prevent replaying captured sessions for offline analysis.

November 02, 2015

The attack was an effective one from a social engineering standpoint as impacted users were prompted to download what they believed was an Adobe Flash update, a common occurrence, but in reality, they were downloading a botnet Trojan. At present, only about half of the major antivirus vendors have signatures in place to combat this threat.

October 30, 2015

The privacy concerns are alarming, Desai noted. He points out that SMS messages could contain not only personal interactions, but also mobile banking and other verification codes for online services.

October 30, 2015

Hackers have created Android malware that hides itself as a Microsoft Word document in order to trick users into opening it and steal data. The malware was discovered by IT security firm Zscaler. When triggered, the malware scans all of the smartphone's data and sends it to the hacker via email.

October 29, 2015

An APT is not opportunist or a mindless piece of code – the attacker tends to be organized and motivated to accomplish a task with a high payoff. Once a target is infiltrated, the attacker maintains a presence at the target exfiltrating information over an extended period of time, said Sutton.

October 16, 2015

However, after completing the a $110m round of funding last month, the last $25m of which came from Google Capital, the cloud security vendor will be pouring substantial investment into developing channel sales and marketing. ‘Having built a reliable, stable cloud, we are now looking to quadruple our channel team and really drive sales,’ said Charles Milton, director EMEA channels.

October 12, 2015

Another issue with BYOD is that employees often end up using their devices for purposes not intended, such as watching TV, online videos, or livestreamed events, which can significantly weigh down a company’s network. Internet security company Zscaler discovered in 2012 that sports-related traffic reached more than 74 percent after NCAA’s March Madness began, and employees began online streaming at peak office hours.

October 07, 2015
Die Einführung der Cloud-basierten Internet Security Plattform von Zscaler erfüllt heute all diese Anforderungen: Den sicheren Internet-Zugang und eine Outbound Firewall für die Georgsmarienhütte Holding GmbH stellt heute der GMH Systems als Managed Security Service bereit. Die IT-Leiter der GMH Gruppe profitieren von umfangreichen Analyse- und Reporting-Möglichkeiten rund um den Internet Traffic ihrer Unternehmen. Das erleichtert es dem Team, Business Policies zu definieren, um die Effektivität der Mitarbeiter zu erhöhen, Sicherheitsrisiken frühzeitig zu erkennen und zu vermeiden.
October 06, 2015
Zscaler et Global Cloud Xchange annoncent la formation d’un partenariat aux termes duquel les solutions de sécurité administrée de GCX seront associées à la plate-forme Internet Security de Zscaler que GCX proposera aux grands comptes et aux sociétés du secteur des nouveaux médias à travers le monde.
October 06, 2015
On imagine aisément qu’AutoFocus profite également des données échangées avec McAfee, Symantec et Fortinet au sein de la Cyber Threat Alliance et dédiée, précisément, au partage d’informations critiques sur les menaces informatiques. Mi-février dernier, ils ont été rejoints par Barracuda Networks, ReversingLabs, Telefonica, et Zscaler.
October 06, 2015
Zscaler et Global Cloud Xchange (GCX), filiale de Reliance Communications, annoncent la formation d’un partenariat aux termes duquel les solutions de sécurité administrée de GCX seront associées à la plate-forme Internet Security de Zscaler que GCX proposera aux grands comptes et aux sociétés du secteur des nouveaux médias à travers le monde.
October 06, 2015
Zscaler et Global Cloud Xchange GCX , filiale de Reliance Communications, annoncent la formation d'un partenariat aux termes duquel les solutions de sécurité administrée de GCX seront associées à la plate-forme Internet Security de Zscaler que GCX proposera aux grands comptes et aux sociétés du secteur des nouveaux médias à travers le monde.
September 30, 2015
Internet security company Zscaler has signed a partnership agreement with Global Cloud Xchange (GCX), a subsidiary of Reliance Communications. The partnership combines GCX’s managed security services with Zscaler’s Internet Security Platform, which GCX will offer to enterprises and new media companies worldwide.
September 30, 2015
Investors have been paying a lot of attention to the cyber security sector as of late. Other cyber security companies to see funding in the past month include Exabeam, with a $25 million Series B round, and ZScaler, which added $25 million to its already oversubscribed Series D round that hit $110 million.
September 29, 2015
Zscaler, the Internet security company, and Global Cloud Xchange (GCX), a subsidiary of Reliance Communications, today announced a partnership that combines GCX’s managed security solutions with Zscaler’s Internet Security Platform, which GCX will offer to enterprises and new media companies across the globe.
September 28, 2015
“The covert campaign was discovered by researchers at Zscaler who revealed that this campaign has been in place since first week of August. The spyware and PUAs have affected more than 20,000 users and have been sent to over 2,000 WordPress websites.”
September 28, 2015
“In one case observed by the Zscaler researchers, users were prompted to update Adobe Flash player. If the victim allows the download goes ahead, once the unwanted programs have been downloaded, victims are told their Adobe update has failed and are sent to the legitimate website.”
September 28, 2015
“An injection attack inserted code into 2,000 WordPress web pages, according to a post on Zscaler's ThreatLab blog. The campaign lets attackers inject malvertising and spyware applications into the .js files of the widely used content management system and blogging platform after a user clicks on a prompt that downloads a phony Adobe Flash Player application”
September 28, 2015
The Zscaler security research team started investigating multiple WordPress related security events earlier this month and came across a new widespread compromised WordPress campaign leading to the download of unwanted applications. This has been briefly covered by dynamoo and has been reported by some users on official WordPress forums.
September 26, 2015
Contrairement aux campagnes précédentes qui impliquaient des auteurs de logiciels malveillants et des opérateurs de kits d’exploit, la charge utile pour amorcer cette campagne implique des logiciels espions et des applications potentiellement indésirables. Ces applications peuvent sembler anodines mais peuvent faciliter les attaques de type malvertising par des publicités non sollicitées », a averti Zscaler.
September 25, 2015
A closer look at the infected websites reveals that they are running the latest version of the WordPress CMS, version 4.3.1. Being the most recent and security-hardened release, Zscaler's staff thinks most of the sites were infected in earlier versions, before the core was updated.
September 25, 2015
Zscaler revendique plus de 15 millions d’utilisateurs dans le monde et la sécurisation de plus de 15 milliards de requêtes internet. La société affirme bloquer plus de 100 millions de cyber-menaces chaque jour.
September 25, 2015
Each week Talkin' Cloud compiles a list of cloud computing financing stories for readers who might have missed the news earlier in the week. This week's column features funding news from Onshape, Blue Jeans Network, Zscaler, Skilljar and Allbound.
September 25, 2015

Google Capital has added $25 million to Internet security company Zscaler’s Series D funding, which now totals $110 million.

September 24, 2015
Google Capital Partner Gene Frantz welcomed the investment, saying: "We are big believers in the two unstoppable technology trends that Zscaler is riding - the rise of mobile computing and the evolution from point solutions hosted on-site to integrated cloud platforms."
September 24, 2015
Zscaler has closed its Series D round after receiving an additional $25 million in funding from Google Capital. The round was originally announced in August with TPG as lead investor; the extension brings the round total to $110 million.
September 24, 2015
“We are joining forces with Google Capital to help millions of organizations around the world securely adopt cloud computing, mobility and the Internet of Things,” Jay Chaudhry, CEO of Zscaler, said in a company release.
September 24, 2015
The firm announced today it has secured a $25m investment from Google Capital, to "bolster Zscaler's global expansion, as well as accelerate the growth of the company's technology and customer base," according to a company statement.
September 24, 2015
After the latest round of $25mn, the total funding reached to $148mn four times more than company's financing level in just two months. Zscaler's CEO Jay Chaudhry says this is the last financing round before going for an initial public offer (IPO).
September 24, 2015
Zscaler, reported the closing of its recent financing, a $25 million continuation of its oversubscribed Series D round from Google (GOOG) Capital. This recent round of financing brings the firm’s total funding raised in the Series D to $110 million.
September 23, 2015
Cybersecurity firm Zscaler has closed a $110 million financing round, Reuters reports. The company raised $25 million from Google Capital to add to its oversubscribed $85 million round raised in August. Zscaler has now raised $148 million in total, and will now prepare for an IPO, according to CEO Jay Chaudhry.
September 23, 2015
Zscaler, a cloud security company that raised $25 million from Google Capital, just closed a $110-million round of funding.
September 23, 2015
Zscaler, a San Jose cybersecurity company, closes $110 million financing round before eventual IPO.
September 23, 2015
Zscaler Inc., an Internet-security company, has added $25 million from Google Capital GOOGL +2.56% to a recent Series D round to continue its global expansion, the company said.
September 23, 2015
San Jose, California-based mostly Zscaler supplies security for cloud purposes for greater than 5,000 companies and organizations, and lots of of these use Google Inc’s cloud purposes and providers.
September 23, 2015
Zscaler, a cloud security company, also recently closed a new funding round, according to sources close to the company who declined to give the amount. This deal comes just more than a month after Zscaler raised $85 million.
September 23, 2015
Zscaler, Inc., the Internet security company, announced the closing of its latest financing, a $25 million continuation of its oversubscribed Series D round from Google Capital. This latest round of financing brings the company’s total funding raised in the Series D to $110 million. The recent infusion will bolster Zscaler’s global expansion, as well as accelerate the growth of the company’s technology and customer base.
September 23, 2015
Zscaler, die Internet Security Company, kündigt heute den Abschluss seiner aktuellen, überzeichneten Finanzierungsrunde Series D mit weiteren 25 Millionen US-Dollar von Google Capital an.
September 23, 2015
The latest company to get a boost in its financing is Zscaler, a cloud security firm headquartered in San Jose, California. In its most recent round of funding, the company raised $25 million from Google’s equity investment arm that focuses on late-stage financing – Google Capital.
September 23, 2015
“We are joining forces with Google Capital to help millions of organizations securely adopt cloud computing, mobility and the Internet of Things,” said Jay Chaudhry, CEO of Zscaler.
September 23, 2015
Cloud security company Zscaler has raised USD 25 million from Google Capital, in an extension of the oversubscribed USD 85 million round Zscaler raised in August. Founder and CEO Jay Chaudhry told Reuters in an interview he chose to wait for a strategic partner like Google to close out the round.
September 23, 2015
Zscaler, la société spécialisée dans la cyber-sécurité par le cloud, a levé 25 millions de dollars auprès de Google Capital en série D. Au total, elle aura levé 110 millions de dollars Créée en 2008, elle revendique une base de 5 000 entreprises utilisant ses solutions pour lutter contre les attaques informatiques.
September 22, 2015
That “something” is the creation of the Cyber Threat Alliance, a group of security vendors that have agreed to share threat information with one another. So far, it includes Palo Alto, Symantec, Intel, Fortinet, Barracuda, zScaler, Telefonica and Reversing Labs.
September 22, 2015
And Zscaler, a cloud security company, also recently closed a new funding round, according to sources close to the company who declined to give the amount. This deal comes just more than a month after Zscaler raised $85 million.
September 22, 2015
Zscaler, a cloud security company, also recently closed a new funding round, according to sources close to the company who declined to give the amount. This deal comes just more than a month after Zscaler raised $85 million.
September 18, 2015
In yet another triple-digit funding for the security industry this summer, Zscaler landed $100 million in Series B funding in August from TPG, EMC and Lightspeed Ventures.
August 27, 2015
Zscaler, founded by serial entrepreneur Jay Chaudhry, plans to spend its new war chest on transforming itself from a next-generation-firewall-in-the-cloud company to one whose cloud-based security platform is capable of performing a number of data protection tasks. CMO Daniel Druker tells Channelnomics that a large chunk of the funding will go toward bolstering channel relationships, getting developers to write security applications and helping resellers take the service to market.
August 25, 2015
"Zscaler was easy to understand. You have absolute confidence that you have purchased what you needed to, you can track usage and it's just a much simpler model, and it makes them easier to do business with," he said.
August 24, 2015
Zscaler links recent spikes in Neutrino exploit kit infestation to compromised WordPress sites. Fortinet reports finding an unknown and uncharacterized document exploit.
August 24, 2015
The first such attack was revealed by cybersecurity company Zscaler on Aug. 14. In a report, it detailed a Chinese cyberattack against an unnamed, “well-known financial services firm.”
August 24, 2015
In a blog post, Zscaler ThreatLabz, says: “The new wave of Neutrino is targeting outdated versions of WordPress. In fact, we have seen over 2600 unique WordPress sites being used in this campaign where more than 4200 distinct pages have been logged with dynamic iframe injection in the last month.
August 22, 2015
A new campaign that uses compromised WordPress sites to redirect users to websites hosting Flash exploits was spotted in the wild by Internet security company Zscaler.
August 22, 2015
What's the potential impact of this volatility on the hot cybersecurity sector and firms such as Symantec, Cisco and Zscaler - all of which have made recent high-profile moves?
August 22, 2015
Also this week: WAN equipment company Silver Peak revealed it is teaming up with Infoblox, Nutanix, and Zscaler to expand Silver Peak’s Unity EdgeConnect ecosystem.
August 22, 2015
Experts from security company Zscaler have uncovered a malware campaign which relies on thousands of hijacked WordPress sites hosting the Neutrino Exploit Kit.
August 21, 2015
According to Zscaler, cybercriminals have compromised more than 2,600 WordPress websites over the past month. The hackers planted malicious iframes on 4,200 distinct pages of websites running vulnerable versions of WordPress 4.2 and prior. These iframes redirect users to Neutrino exploit kit landing pages.
August 21, 2015
Zscaler has identified a campaign involving compromised WordPress websites redirecting visitors to the Neutrino Exploit Kit, which then serves up CryptoWall 3.0 ransomware by means of a recently patched Adobe Flash Player vulnerability.
August 21, 2015
In a report published yesterday, Zscaler said it spotted attacks against sites running older versions of the content management system, 4.2 and earlier. Those sites are backdoored and redirect a victim’s browser through iframes to a landing page hosting the exploit kit where a Flash exploit awaits.
August 21, 2015
The warning comes from security vendor Zscaler, which noted on Thursday that in the past few days it has seen a “massive uptick” in the use of the Neutrino Exploit Kit, which last month reportedly included a zero day exploit discovered by the Hacking Team breach. “The cause for this uptick appears due to widespread WordPress site compromises,” Zscaler researchers have concluded.
August 21, 2015
Zscaler said in an analysis that in the beginning of July, Neutrino incorporated the HackingTeam 0-day (CVE-2015-5119), “and in the past few days we've seen a massive uptick in the use of the kit.”
August 21, 2015
Infoblox, Nutanix, and Zscaler teamed up with Silver Peak to expand its Unity EdgeConnect initiative for SD-WAN implementation.
August 21, 2015
Earlier this week Zscaler reported that, like Blue Termite, the Chinese APT group known as Emissary Panda and Threat Group 3390 had also been using Hacking Team Flash exploits.
August 20, 2015
To compile this list, we looked at Glassdoor's ranking of the best small and medium companies to work for in 2015. The Glassdoor ranking is based on the input of employees who provided feedback about their satisfaction with the overall company via Glassdoor's company review survey.
August 20, 2015
In a business as dependent as Ashley Madison was on unimpeachable security for its continued commercial viability, a technology such ZScaler’s is also needed to monitor the data being accessed by trusted users and prevent unauthorized downloads of sensitive material.
August 19, 2015
Then growth should return and the valuation could expand closer to its much more highly valued peers. Its closest competitors, ZScaler and OpenDNS were recently valued over $1 billion and $635 million respectively.
August 19, 2015
According to Zscaler, the group leveraged the CVE-2015-5119 vulnerability to target a major financial services firm. While it has not been named, Zscaler told SecurityWeek that the targeted organization is a multi-national financial services firm with locations across Europe, Middle East and Asia.
August 19, 2015
Emissary Panda has also leveraged another Hacking Team Flash Player exploit (CVE-2015-5123) in its operations. Zscaler says the attack was not an isolated incident.
August 19, 2015
Zscaler is the latest "unicorn" to be created out of the cloud-security surge. Unicorns are private, venture-backed companies that reach $1 billion in valuation. Zscaler recently announced it had received $100 million in Series B funding The company has raised a total of $138 million.
August 19, 2015
“Whether conducting transactions online or at a brick-and-mortar stores, consumers have little choice but to rely on retailers to properly secure their information… There are no bulletproof countermeasures for consumers when it comes to protecting financial data or Personally Identifiable Information (PII).
August 19, 2015
Cammish says Zscaler has helped the firm manage the growing malware threat witnessed by the company. Last month 250,000,000 interactions with the internet were recorded. Of these, around 600,000 activities or transactions involved malware.
August 17, 2015
Cybersecurity firm Zscaler found a “well-known Chinese cyber espionage group” using zero day exploits exposed to the world by the attack on Hacking Team to penetrate a large, unnamed financial firm. An unknown hacker ransacked Italian intrusion software maker Hacking Team’s internal files in July, posting them online.
August 17, 2015
The Santa Clara, Calif.-based vendor said partnering with Nutanix, Infoblox and Zscaler will push it ahead of competitors such as Cisco, CloudGenix, VeloCLoud and Viptela.
August 13, 2015
"Our mission is to make the Internet safe for business by delivering an amazing security platform that protects our clients and enables the strategic adoption of cloud computing, mobile devices and the Internet of Things," said Jay Chaudhry, CEO of Zscaler.
August 13, 2015
Zscaler, Inc., the Internet security company, announced the closing of a new round of financing led by TPG. Zscaler is being funded with an aggregate of $100 million. TPG invested in Zscaler, alongside existing investors EMC and Lightspeed Ventures, who also contributed to the round.
August 13, 2015
Bei der Analyse von Daten aus seiner Cloud-Sandbox hat Zscaler kürzlich ein großes MultiPlug-Netzwerk entdeckt. Aufmerksam geworden ist die Internet Security Company auf das MultiPlug-Netzwerk wegen eines Verhaltensmusters, bei dem Zertifikate mittels Code unterzeichnet werden. Auch die Größe seiner Hosting-Infrastruktur war verdächtig.
August 11, 2015
Security startups continue to cash in with Zscaler being the latest to join companies like BitSight, Menlo Security and CounterTack on the list of new firms being funded to bolster their respective security strategies.
August 11, 2015
Driven by a seemingly unending parade of breaches, investors looking for the next big score—the rare "unicorn" company that becomes valued at $1 billion or more—are pouring money into security startups and early-stage ventures.
August 11, 2015
Internet security company Zscaler recently announced the finalization of $100M in funding. TPG led the funding round in conjunction with existing investors EMC and Lightspeed Ventures.
August 11, 2015
The Wall Street Journal and Dow Jones VentureSource are tracking venture-backed private companies valued at $1 billion or more. See how the club has expanded since the project began in January 2014 and select companies to learn more about each.
August 10, 2015
Zscaler Inc, a San Jose-based Internet security start-up, has raised $100 million in a new round of financing, led by private investment firm TPG, with participation from existing investors EMC and Lightspeed Ventures. As part of the new investment, Nehal Raj, partner at TPG, will be appointed to the Zscaler board of directors.
August 08, 2015
August 08, 2015
Cybersecurity firm Zscaler raised $100 million in a round led by TPG Growth.
August 07, 2015
Zscaler, spécialiste de la sécurité sur Internet, a annoncé la fin d’un nouveau round de financement avec TPG. Zscaler a été financé à hauteur de 100 millions de dollars. TPG a investi dans Zscaler aux côtés d’EMC et Lightspeed Ventures, qui ont également participé à ce round de levée de fonds.
August 07, 2015
Have you ever felt the need to take a hammer to your networking equipment or firewall? Zscaler gave you the chance at Black Hat to do just that with an enclosed room dedicated to taking out your anger with outdated or underperforming hardware.
August 07, 2015
Each week Talkin' Cloud compiles a list of cloud computing financing stories for readers who might have missed the news earlier in the week. This week's column features funding news from Tintri, Zscaler, Workfront, Koding and SalesWarp.
August 07, 2015
Der Security-Anbieter Zscaler hat unter Führung des Investors TPG eine weitere Finanzierungsrunde abgeschlossen. Die Summe von insgesamt 100 Millionen Dollar stammt außer von TPG auch von den ebenfalls bisher bereits aktiven Investoren EMC und Lightspeed Ventures.
August 06, 2015
Internet security firm Zscaler announced it has raised $100 million to step up global expansion and sales efforts for its platform. The funding round was led by late-stage investor TPG, with existing investors EMC and Lightspeed Ventures contributing.
August 06, 2015
He agreed that it is almost impossible to detect this attack as it is not visible to the user. “Automatic tools like firewalls or even highly sophisticated systems like Zscaler will not be able to detect this attack, because the file sync is normally an ‘allowed' operation and the attacker does not change this. No security system is able to distinguish bad traffic from good,” Edge said.
August 06, 2015
America's big information security conference comes into its 18th year with standing room only talks and a big-money expo, but still can't hire hackers fast enough to match industry growth.
August 05, 2015

Jay talks to Emily Chang about Zscaler’s $100 million financing round and plans for an IPO.

August 05, 2015
Security software provider Zscaler announced it has closed a funding round worth $100 million and achieved a coveted “unicorn” valuation of over $1 billion. The financing round was led by TPG and included investments from existing investors EMC and Lightspeed Ventures.
August 05, 2015
Already considered one of the top security firms in the world, Zscaler has just landed a brand new round of funding that totals around $100 million that was led by TPG Growth.
August 05, 2015
And right on the heels of CrowdStrike’s announcement comes the latest $100 million round, though this time it is a Series B and going to Zscaler — bringing the firm’s total fundraising to $138 million and its valuation to $1 billion.
August 05, 2015
Cloud security company Zscaler Inc. is the latest to join the "Unicorn" club -- private venture-backed companies with valuations of $1 billion or better -- with a $100 million raise this week.
August 05, 2015
Cloud based security company Zscaler recently raised over $100 million in a second round of venture capital funding which brings the company to a total of $138 million raised from investors. The most recent round of funding valued the company at $1 billion and was led by TPG Growth.
August 05, 2015
Jay talks to Emily Chang about Zscaler’s $100 million financing round and plans for an IPO.
August 04, 2015

TPG has backed such prominent software developers as Uber Technologies, Airbnb and Box, and this new investment in Zscaler marks its first stake in a cyber security company.

August 04, 2015

Cloud security platform is demonstrating the rapid growth possible for companies providing cloud security services, as it announced a $100 million Series B funding round based on a valuation of over $1 billion. The funding round was led by TPG, which was joined by existing investors Lightspeed Ventures and EMC.

August 04, 2015
TPG has backed such prominent software developers as Uber Technologies, Airbnb and Box, and this new investment in Zscaler marks its first stake in a cyber security company.
August 03, 2015

TPG led the funding round, which is only Zscaler’s second outside financing effort. The 500-employee security company operates entirely from the cloud and doesn’t require any hardware to protect its customers from malicious viruses or other security threats. Chaudhry, who has founded and worked at multiple startups, has partly financed the company himself, allowing Zscaler to skip many traditional venture capital funding rounds.

July 23, 2015
“It does not appear from the post that Stefan [Esser] had previously reported the flaw to Apple, so it is quite likely as he noted that this was a 'code cleanup' effort as opposed to a 'security patch',” said Michael Sutton, CISO at Zscaler.
July 22, 2015
“It’s highly likely that scammers who have had nothing to do with the breach will take advantage of it,” commented Michael Sutton, vice president of security research at cloud security company Zscaler.
July 22, 2015
Experts have predicted the user data may end up changing hands in the illicit marketplaces of the Deep Web. According to Michael Sutton, vice president of security research at cloud security company Zscaler, that potentially opens the path to blackmailers.
July 22, 2015
Experts have predicted the user data may end up changing hands in the illicit marketplaces of the Deep Web. According to Michael Sutton, vice president of security research at cloud security company Zscaler, that potentially opens the path to blackmailers.
July 22, 2015
Michael Sutton, chief information security officer (CISO) at Zscaler, said: “The attackers are stating that while Ashley Madison customers have been charged US$ 20 for a 'full delete' of customer data, this is not actually occurring. The payment for the 'full delete' is recorded and the customer name and credit card information is retained, thus maintaining a record that the individual was a customer, thereby largely defeating the purpose of the payment.”
July 22, 2015
“It is highly likely that scammers who have had nothing to do with the breach will take advantage of it. Scammers are likely to see an opportunity to profit by sending random ransom emails. With 37 million accounts compromised it won’t be difficult to identify people that are indeed Ashley Madison customers and are willing to pay a ransom in the hopes that it will maintain their anonymity
July 22, 2015
“The attackers are stating that while Ashley Madison customers have been charged $20 for a ‘full delete’ of customer data, this is not actually occuring. The payment for the ‘full delete’ is recorded and the customer name and credit card information is retained, thus maintaining a record that the individual was a customer, thereby largely defeating the purpose of the payment.”
July 20, 2015
Now these capabilities are being made available as a cloud service. Interfacing with a security service provider like zScaler enables local Internet breakouts without requiring further investment in on-premises Internet security appliances.
July 19, 2015
Michael Sutton, de CISO Zscaler, nous propose une Tribune Libre consacrée aux menaces du BYOD (Bring Your Own Device), c'est à dire le fait d'apporter et d'utiliser vos appareils personnels dans le cadre professionnel.
July 18, 2015
It’s been over a year since we wrote our original post sharing our analysis of the last decade’s most successful U.S.-based, venture-backed tech companies.
July 17, 2015
Heureusement, la plupart des employés acceptent des mesures de sécurité de base qui assurent la protection des données de l’entreprise tant que leurs contenus et usages personnels restent intouchés, commente Michael Sutton, CISO Zscaler.
July 15, 2015
Les entreprises ne peuvent plus se contenter des contrôles de sécurité traditionnels pour protéger les appareils mobiles. Les solutions de sécurité cloud permettent au trafic des appareils mobiles d’être surveillé même en dehors de l’entreprise ainsi que sur les réseaux tiers sans qu’il y ait besoin d’installer des applications de sécurité lourdes ou de mettre des restrictions difficilement acceptables pour le propriétaire de l’appareil.
July 15, 2015
L’essor du BYOD pousse à repenser la sécurité des terminaux mobiles car l’entreprise ne peut dicter la politique de sécurité des appareils ne lui appartenant pas mais ne peut, non plus, autoriser un appareil potentiellement corrompu accéder à ses ressources internes. Un juste milieu doit être trouvé si l’on veut que le BYOD fonctionne en entreprise. Heureusement, la plupart des employés acceptent des mesures de sécurité de base qui assurent la protection des données de l’entreprise tant que leurs contenus et usages personnels restent intouchés.
July 13, 2015
Michael Sutton, chief information security officer at Zscaler, warned that contrary to the researchers' proposal, there is no silver bullet for dealing with ransomware.
July 09, 2015
Earlier this year, for example, security firm Zscaler found that compromised WordPress Web sites were forwarding visitors’ login credentials to an attacker-controlled site. Last year, in one of the worst cases of serial compromise, a malicious program, known as SoakSoak, infected more than 100,000 Wordpress sites using a vulnerability in a popular plugin.
July 09, 2015
Zscaler wrote in a blog post that in addition to these vulnerabilities, it found various modules and other tools Hacking Team used to compromise victims.
July 09, 2015
Zscaler researchers have analyzed the exploits and remote control tools found in the leak and they have identified a Mac OS X rooting exploit, a multistage Java exploit module, driver files that could contain rootkit functionality, and various components of Hacking Team’s flagship Remote Control System (RCS) product.
July 09, 2015
Researchers at Zscaler reported the app, which had a package name of com.polaris.BatteryIndicatorPro. The app requested excessive permissions from the user in an attempt to get full control of an Android device.
July 08, 2015
As Zscaler wrote, “The legit BatteryBotPro app demanded for minimal permissions,” while, in contrast, “Upon installation of the malicious app, it demanded administrative access, which clearly portrays the motive of malware developer to obtain full control access of the victim’s device.”
July 08, 2015
Google has removed a malicious application posing as a popular batter monitoring app from Google Play, following revelations from security firm Zscaler
July 07, 2015
The fake app was able to send premium-rate text messages and blocked people from deleting it, said security company Zscaler on its blog.
July 07, 2015
The Register reports that Google accepted the BatteryBot Pro app onto the Google Play Store, meaning that Android users were able to download and use the app. But researchers from Zscaler Research looked into the app and found some worrying things happening in the background.
July 07, 2015
Google has removed a fake battery monitoring application that appears designed to compromise the device it is installed on. The malicious application, named BatteryBot Pro, was offered for free and was spotted by Zscaler.
July 07, 2015
Zscaler's researchers have analyzed the spoofed BatteryBot Pro app, and discovered that it asks considerably more permissions than the legitimate app, and among them is the permission to send SMS, access the Internet, get account details, process outgoing calls, download additional software packages without notifying the user, and so on.
July 07, 2015
Zscaler wrote that the app disguises itself as the free version of a legitimate pay-to-use app, BatteryBot Pro, which sells in the official Google Play store for $2.99. The app was even briefly slipped into the Play store before Google removed it, the firm revealed, noting that it greatly differs from the legitimate app in that it asks for minimal permissions, including access to photos and to disable a screen lock.
July 07, 2015
According to cloud-based security firm Zscaler, cybercriminals have taken the legitimate BatteryBot Pro app and embedded malicious modules into it.
July 07, 2015
A battery monitoring app has been yanked from Google’s app store after online security firm Zscaler discovered hackers could use it to obtain control of users’ devices.
July 06, 2015
Gordon replaces previous CFO Sydney Carey who left in February (and landed at internet security company Zscaler
July 06, 2015
“Upon installation of the malicious app, it demanded administrative access, which clearly portrays the motive of malware developer to obtain full control access of the victim's device”, Desai writes.
July 06, 2015
Ms. Carey left MongoDB in February for venture-backed security company Zscaler Inc. and couldn’t be reached for comment.
July 06, 2015
MongoDB, one of the largest and most popular of the emerging database startups, hired Michael Gordon as chief financial officer, replacing previous CFO Sydney Carey, VentureWire’s Deborah Gage reports. Ms. Carey left MongoDB in February for venture-backed security company Zscaler and couldn’t be reached for comment.
July 03, 2015
Zscaler a pu constater le succès rencontré par sa plateforme de sécurité Internet basée sur le Cloud, avec des entreprises industrielles qui passent de simples dispositifs matériels à une offre de sécurité as a service, et avec la convergence de solutions ponctuelles dans les plateformes intégrées.
July 03, 2015
Zscaler, spécialiste de la sécurité sur Internet, annonce que le cabinet d'analystes indépendant Forrester Research l'a nommé Leader de la sécurité des contenus Web en mode SaaS Security as a Service , dans son rapport du 2e trimestre 2015 The Forrester Wave SaaS Web Content Security.
July 03, 2015
Dans le domaine de la sécurité as a service, Forrester mentionne Zscaler comme le leader. Ce spécialiste de la sécurité sur Internet qui revendique 5 000 entreprises clientes a obtenu les meilleurs classements, devant les autres sociétés entrant dans le cadre de cette étude (Barracuda Networks, Blue Coat Systems, Cisco, iboss, Intel Security (McAfee), Symantec, Websense), dans les trois catégories évaluées : Current Offering (Offre actuelle), Strategy (Stratégie) et Market Presence (Présence sur les marchés).
July 02, 2015

Researchers at Zscaler have been tracking a long-term campaign that dupes users who are looking for various pirated content such as games or TV shows into installing adware. Rather than getting the content they’re looking for, users download a file that appears to be legitimate but includes the malicious content instead.

July 02, 2015
Daniel Druker, Chief Marketing Officer chez Zscaler explique : Cette aquisition est un nouveau signal marquant le début de la fin des appliances de sécurité. Un déclin porté par l’infatigable croissance du cloud computing, de la mobilité et de l’internet des objets.
July 02, 2015
Daniel Druker, Chief Marketing Officer chez Zscaler explique Cette aquisition est un nouveau signal marquant le début de la fin des appliances de sécurité. Un déclin porté par l'infatigable croissance du cloud computing, de la mobilité et de l'internet des objets.
July 01, 2015

Daniel Druker, chief marketing officer at Zscaler, said this acquisition is another sign that the days of security appliances are numbered due to the “unstoppable growth of cloud computing, mobility and the Internet of Things”.

July 01, 2015

Commenting on the launch Zscaler’s (a fellow security as a service firm) CMO, Daniel Druker, said the acquisition is another signal for the beginning of the end of security appliances, driven by the unstoppable growth of cloud computing, mobility and the Internet of Things.

July 01, 2015

In response to the news that Cisco plans to acquire OpenDNS for $635 million, Daniel Druker, Chief Marketing Officer at Zscaler, said this could kick start the end to security appliances.

June 30, 2015
As with all CRN Intelligence reports, this one has allowed for free text feedback, and the 200+ UK resellers that took part have not held back. Painful reading for some maybe, but nowhere else will you see such open and honest feedback, and be able to improve your channel programmes and partner interactions as a result.
June 29, 2015
Content that appears to be legitimate should not be trusted implicitly if it comes from a suspicious source like sites offering pirated content, says Chris Mannon of Zscaler.
June 29, 2015
WeCloud operates through a network of channel partners and lists a number of other vendors – including Zscaler – as technology partners.
June 26, 2015
There are a number of CASBs, including Mississauga, Ont.-based Perspecsys Inc. CipherCloud Inc., SkyHigh Networks, Netskope, Adallom, CloudLock, Zscaler, Actifio, Bitglass, Trend Micro’s SecureCloud and CloudLink
May 29, 2015
Zscaler researchers explained on the corporate blog that it has seen a large number of sites, dressed up as search engines, that lead to malicious content including sites hosting the Magnitude Exploit Kit.
May 28, 2015
Le monde de la sécurité en entreprise traverse actuellement une période de mutation liée aux bouleversements rapides qui transforment profondément la façon de travailler des entreprises. De nouvelles technologies et de nouvelles tendances sont en train de modifier la définition même du réseau d’entreprise, la manière dont nous travaillons et les lieux où nous travaillons, ainsi que les outils utilisés pour accomplir notre travail.
May 28, 2015
Les DSI éprouvent souvent des difficultés pour s’adapter à cette nouvelle réalité en raison de la rapidité à laquelle les besoins métier évoluent. Historiquement, les Directions IT ont toujours préféré déployer leurs projets applicatifs dans un délai relativement long, en étudiant attentivement l’impact sur la conception du réseau et la stratégie de sécurité de l’entreprise.
May 28, 2015
Jay Chaudhry, CEO and founder of Zscaler joins Francine Lacqua on “The Pulse” to discuss his startup that is revolutionizing the world of internet security. His company is currently the only one that protects against cyber threats with a totally cloud-based solution.
May 27, 2015
Par Charles Milton, directeur de Zscaler Services Providers pour la région EMEA
May 27, 2015
Par Charles Milton, directeur de Zscaler Services Providers pour la région EMEA
May 26, 2015
Les fournisseurs de matériels n’en sont pas au même niveau de connaissance en matière de sécurité que leurs homologues dans l’industrie du logiciel qui ont été poussés très tôt à modifier leur tactiques de développement à mesure qu’une multitude de vulnérabilités ont été révélées au grand jour » selon Michael Sutton, Vice Président en Recherche Sécuritaire chez Zscaler.
May 23, 2015
In the interests of "data loss prevention" (a euphemism for stopping people sending commercially sensitive data out of the company), companies such as Zscaler will, when brought into a corporate site, covertly install self-signed SSL certificates onto every employee's computer.
May 21, 2015
Zscaler researchers explained on its blog that it has seen a large number of sites, dressed up as search engines, that lead to malicious content including sites hosting the Magnitude Exploit Kit.
May 20, 2015
Online advertisements can be annoying. But what if they spread malware too? The excessive greed of few has lead to the rise of malvertising, advertisements that redirect or lead to malware. A recent Zscalar study revealed that several compromised websites contained ads that led to ransomware.
May 19, 2015
Les sites WordPress piratés ouvrent une « porte dérobée » – backdoor – au moment où les utilisateurs se connectent à leur compte. D’après Zscaler les identifiants sont encodés et transférés au site pirate par une requête GET
May 19, 2015
Les objets connectés se multiplient et dans le même temps les menaces de sécurité s’amplifient. Nous souhaiterions vous proposer l’expertise de Zscaler pour aborder cette thématique.
May 19, 2015
“This is a highly profitable ransomware payload that leverages Bitcoin transactions executed over the Tor Anonymizer to monetize the attack,” wrote ZScaler researchers Edward Miles & Chris Mannon.
May 12, 2015
Ravi Mahtre from Lightspeed Venture Partners writes about the companies he believes will be the new generation of market leaders, and notes that Zscaler is the market leader in cloud-based security.
May 12, 2015
The Glasgow Contemporary Choir and the Blissfields music festival near Winchester are among the innocent victims of what's being described as a 'unique' attack on WordPress-powered websites. Security firm Zscaler's Sameer Patil and Deepen Desai said they found the attack was planting backdoor code on the sites, in order to capture the credentials of everyone logging into them and send them to a US-based attacker website, the dodgy domain “conyouse.com”.
May 12, 2015
The SaaS provider Zscaler said that a number of WordPress-based websites have been compromised after users have logged on to their site from a home page containing malicious code . Once the captured data, they were then sent in encrypted format to hacker.
May 11, 2015
Wordpress admins hoping for some feet up time after last week's Twenty Fifteen XSS plugin vulnerability appear to have yet another vulnerability to handle. Researchers at Zcaler have identified a bunch of compromised sites that are all leaking user credentials to the same target domain – conyouse.com hosts the command and control.
May 11, 2015
SaaS (Security-as-a-Service) provider Zscaler reported that a number of WordPress-based websites have been compromised with users trying to login to them being served malicious code as part of the login page. Once captured, that data is then sent, in an encrypted format, to the hacker.
May 11, 2015
WordPress, being one of the most popular content management systems and blogging platforms on the internet, remains an attractive target for cybercriminals due to its large user base. According to Zscaler researchers Sameer Patil and Deepen Desai, the compromised sites run backdoor code, which activates when the user submits login credentials. The credentials are then encoded and sent to an attacker website in the form of a GET request.
May 11, 2015
Wordpress, the Internet's favorite content management system, is a common target for criminals who redirect innocent users to malware download sites. But a new type of malware steals user login credentials instead, while leaving the rest of the user experience unchanged. "It's an interesting attack -- we haven't seen this before," said Michael Sutton, VP of Security Research at San Jose-based cloud security vendor Zscaler, Inc., which recently issued a report about the malware.
May 08, 2015
Zscaler researchers reported spotting a campaign in which malicious actors have compromised multiple WordPress website in an effort to steal their users’ credentials. The compromised websites contain a backdoor designed to harvest credentials and send them back to the attackers.
May 08, 2015
With a raft of WordPress vulnerabilities—most of them in plugins—to address, now comes word from researchers at Zscaler that a number of sites running the content management system have been compromised and are sending credentials via a backdoor to a criminal group.
May 08, 2015
With a raft of WordPress vulnerabilities—most of them in plugins—to address, now comes word from researchers at Zscaler that a number of sites running the content management system have been compromised and are sending credentials via a backdoor to a criminal group.
April 29, 2015
Enable Ipanema devices (IP engines) to establish VPN tunnels via the Internet, towards remote data centers that have VPN concentrators (public or private) or web security gateways such as Zscaler
April 29, 2015
Far from going the way of the dodo as many had surmised, Internet Relay Chat (IRC) botnets are alive and thriving. A new study by security vendor Zscaler shows that IRC botnets, while not growing at a particularly rapid rate, continue to be active and have incorporated several new features over the years that make them as a potent a threat as ever.
April 28, 2015
The Ipanema devices can establish VPN tunnels via the Internet, towards remote data centers that have VPN concentrators or web security gateways such as Zscaler.
April 27, 2015
Visibility, data center security, two-factor authentication, and services were the stars of RSA 2015.
April 24, 2015
Researchers at Zscaler have conducted an analysis of some of the most prevalent IRC-based botnets and determined that these types of threats remain effective as the features incorporated into them continue to improve.
April 24, 2015
Researchers at Zscaler say that this tactic is most likely adopted to evade detection based on blacklists with known names for malicious apps.
April 21, 2015
Talkin' Cloud at the end of each day pulls out five must-read cloud computing stories from the news cycle for its readers to review in the morning. Today's column features Zscaler, Ericsson (ERIC) and Intel Security.
April 20, 2015
Zscaler is a cloud-based firewall, providing network security, control and visibility with no on-premise hardware or software required.
April 20, 2015
Zscaler, Inc. led charge with the addition of a firewall to its managed security platform that promises to keep threats outside the organization and sensitive data inside.
April 20, 2015
Enter Zscaler, a provider of IT security services delivered via the cloud, which just added a next-generation firewall service that can protect both network infrastructure and applications.
April 17, 2015
Zscaler introduced Winter 2015, its cloud-based next-generation firewall.
April 16, 2015
Zscaler introduced the Winter 2015 release of the Zscaler security platform. Zscaler Winter 2015 is a cloud-based firewall providing network security and application control requiring no on-premises hardware or software.
April 14, 2015
Zscaler today announced a cloud-based firewall into a market that is finally ready for a clean pipes offering. Not in the press release is the fact that they hired iPolicy founder Pankaj Parekh to take the project forward.
April 14, 2015
The firewall also fully integrates with Zscalers platform which offers sandboxing, web security, DLP, content filtering, SSL inspection, malware protection and correlation, reporting and analytics.
April 14, 2015
Zscaler democratizes security with economical, easy to deploy, easy to manage next-generation firewall for distributed enterprises and mid-market organizations
April 13, 2015
The new AWS Marketplace for Desktop Apps makes available such desktop software as security and data storage applications, including Zscaler Security Cloud from Zscaler Inc. and IDM Ultra Security from IDM Computer Solutions;
April 10, 2015
Zscaler’s Bill Welch and Lane Bess were featured in a leading Spanish security and IT publication in a story about the growth of the cloud-based security model.
April 09, 2015
Zscaler is mentioned in this round up story that looks at venture funding and acquisitions dollars have been flying fast and furious over the past two months as investors try to cash in on cloud security.
April 06, 2015
Zscaler’s research team weighs in on the browser-based attack tool Angler Exploit Kit (EK) for an article on Softpedia that outlines how the the EK attack tool works. The story also linked back to the Zscaler blog post on the topic for more information.
April 06, 2015
As companies increasingly move sensitive data into the cloud, a number of security implications arise, as well as concerns about investments in these services and technologies. While many organizations are attracted to the benefits of cloud storage, breaches persist, meaning enterprises must create effective plans for migrating their data and monitoring risks, despite the hand-off to third parties. Zscaler’s CEO, Jay Chaudhry, talks to SC Magazine about trends in security spending.
April 05, 2015
The SF Chronicle featured Sydney Carey’s appointment as Zscaler’s CFO in it’s regular feature on loca executive moves.
April 03, 2015

Confirmed members of the The Cloud Security Alliance include PGP Corporation, Qualys and Zscaler. The alliance hopes to brings together experts within several fields - including governance, law, security, cryptography, virtualisation, risk management

March 25, 2015
Zscaler CEO Jay Chaudhry discusses the important of internet security in the cloud and Zscaler’s IPO plans. He speaks with Bloomberg’s Alix Steel on “Street Smart.”
March 23, 2015
The notorious remote access Trojan (RAT) known as njRAT is making a comeback, according to security firms Zscaler and PhishMe.
March 18, 2015
Zscaler have joined the Cyber Threat Alliance (CTA) in its efforts to make united progress in the fight against sophisticated cyber enemies through deep collaboration on threat intelligence and sharing indicators of compromise.
March 13, 2015
Google Code may have been especially attractive to no-goodniks given that people trust anything downloaded from the Google.com domain without knowing or caring that it's from a third-party developer, security firm Zscaler pointed out in 2013. People would download a game or app and unknowingly hand the keys to the kingdom to a bad actor.
March 10, 2015
CRN published The Cybersecurity 500 List, which ranked Zscaler 108 out of 500 cybersecurity companies. The list ranked companies based on innovation, rather than size or revenue. Zscaler was on the list alongside many well-known players in cybersecurity, including FireEye and Palo Alto Networks.
March 04, 2015
Seven-year-old Zscaler has accepted relatively little outside money compared to other security startups, but big companies like Dollar General, Hormel Foods, La-Z-Boy, Nestle and United Airlines rely on its cloud services to fight cyberthreats.
February 26, 2015
Cloud security is a focus of many of the startups coming to market. When Zscaler arrived in 2008, it aimed to take on secure Web gateway vendors with its cloud security platform. Today the company does SaaS-based Web filtering, cloud-based anti-malware, data loss prevention and secure Wi-Fi services.
February 23, 2015
endors included in the research include CA Technologies, McAfee, Symantec, Trend Micro, CipherCloud, CloudLock, CloudPassage, Commtouch Software, CREDANT Technologies, CYREN, HyTrust, IBM, Okta, Panda Security, SafeNet, Skyhigh Networks, ThreatMetrix and Zscaler.
February 23, 2015
Vendors included in the research include CA Technologies, McAfee, Symantec, Trend Micro, CipherCloud, CloudLock, CloudPassage, Commtouch Software, CREDANT Technologies, CYREN, HyTrust, IBM, Okta, Panda Security, SafeNet, Skyhigh Networks, ThreatMetrix and Zscaler.
February 17, 2015
During the summit, the Cyber Threat Alliance, founded by Palo Alto, Symantec, Fortinet and McAfee, announced four new members: Barracuda Networks, Reversing Labs, Telefonica and ZScaler. The goal of the group is for members to share threat information so they can build stronger defenses against advanced adversaries.
February 10, 2015
One of Talkin’ Cloud’s “must-read” stories of the week, VeloCloud announced its support for a policy engine on its namesake service and the signing of a new alliance with Zscaler. These new relationships are making it possible to extend data protection and security policies across the WAN.
February 10, 2015
Cybercriminals adept at social engineering take aim at corporate users luring them with fake emails purporting to be from Microsoft Volume Licensing Service Center and informing the recipient that they received administration permissions for handling volume licenses. Zscaler researchers named it Chanitor, and it has been seen in January to deliver the Vawtrak banking Trojan, but it can also be employed to funnel in other types of malware, too.
February 09, 2015
VeloCloud today announced its support for a policy engine on its namesake service and the signing of a new alliance with Zscaler, making it possible to extend data protection and security policies across the WAN.
February 09, 2015
VeloCloud Networks, a start-up offering a subscription-based, virtualized WAN service for enterprises that aggregates multiple access lines (cable modem, DSL, LTE) into a single secure connection, announced interoperability with leading cloud security platform, Zscaler, spurring growth of its SD-WAN ecosystem.
February 04, 2015
According to a list compiled by Forbes based on Glassdoor.com data, there are several CEOs of cloud companies with more than 90-percent employee approval. Zscaler’s Jay Chaudhry, is among the highest rated CEOs.
February 03, 2015
A relatively new Android Trojan that specializes in stealing banking information by intercepting SMS messages has been making the rounds. Researchers at zScaler spotted the as yet unnamed Trojan circulating as 888.apk. Like many types of malware that came before it, at least for the moment, the Trojan appears to be targeting Chinese Android users.
January 29, 2015
Using the 2015 CRN list as a baseline to compare the Glassdoor.com scores of the (%) of employees who would recommend this company to a friend and (%) of employees who approve of the CEO, the following series of tables were constructed.
January 28, 2015
Zscaler is an IPO candidate for 2015. The Security-as-a-Service provides secure Web gateway capabilities, Web filtering, intrusion prevention and deep packet inspection capabilities. Its data loss prevention can decrypt and inspect content encrypted with SSL.
January 27, 2015
The San Jose Internet Security Provider named William Welch global vice president of sales and chief revenue officer. Recently he was vice president and general manager at HP Software Americas.
January 27, 2015
Z-Scaler (www.zscaler.com), another cloud based solution, takes the OpenDNS model a step further by integrating additional security features into its offering such as malware sandboxing. Z-Scaler's approach is to address complex security issues by engineering the capability into their solution.
January 23, 2015
Researchers at Zscaler provide more details on the use of the vulnerability in the Angler exploit kit. They say that two legitimate ad networks are being used to serve malicious ads, which redirect users to the exploit kit. This is then used to push the 'Bedep' trojan onto the victim's system.
January 22, 2015
Traditional WANs are too complex, too costly and too inflexible to support today's bandwidth-intensive services and applications. Viptela says software defined WANs can fix that.
January 14, 2015
Bill Welch, veteran software industry executive, joins Zscaler as Vice President of Global Sales and Chief Revenue Officer to scale the company’s sales and channel organizations and accelerate growth worldwide.
January 13, 2015
William Welch has joined Zscaler as global vice president of sales, responsible for for scaling Zscaler’s sales and channel organizations and accelerating growth worldwide.
January 13, 2015
Yesterday at the 2015 NRF Conference (National Retail Federation), Cradlepoint has announced the availability of the long awaited Zscaler Internet Security integration. Developed as a joint program between Cradlepoint and Zscaler, this advanced protection monitors data breaches, ensures PCI compliance, and helps remote offices by running a single threat management solution. Built into enterprise routers like the MBR1200, MBR1400, AER 2100, and COR IBR, this is both a rapidly deployed, and easily managed, threat protection solution.
January 13, 2015
One of the biggest security problems when it comes to mobile technology is that of the retail store and the branch office. To that end, Cradlepoint and Zscaler got together to introduce a new breed of hybrid solution that takes the best of a cloud-based solution and matches it with parts of an on-premise solution to deliver powerful, yet useful, protection.
January 13, 2015
"I know a number of people who are concerned that we don't have definitive proof to give proper attribution to the attack, but in cases like this we rarely have all the evidence we need to provide attribution," noted Michael Sutton, vice president of security search for Zscaler. "I do think that while we don't have conclusive proof -- the FBI hasn't been that transparent with us -- I do think North Korea remains the most viable suspect in this attack," Sutton said.
January 12, 2015
A new strain of the Vawtrak banking Trojan has been discovered by Zscaler security researchers, who observed that it was delivered by malware downloader Chanitor.
January 09, 2015
In late November, Sony Pictures Entertainment was hacked by a group calling itself Guardians of the Peace (GOP). What initially appeared to be another hacktivist attack, later turned out to be a sophisticated operation possibly orchestrated by a state actor. Zscaler’s Michael Sutton weighs in.