News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Novel phishing campaigns
Novel phishing campaigns

The annual phishing report shows new phishing campaigns that can be traced back to the increasing use of AI platforms such as ChatGPT. Global phishing attacks increased nearly 2022 percent in 50 compared to 2021 Education was the top target with a 576 percent increase in attacks, followed by finance and government; while attacks on retailers and wholesalers decreased 67 percent, which topped the rankings last year. The five countries with the most attacks were the United States, the United Kingdom, the Netherlands, Canada and Russia. Among the most common…

Read more

Resilience for uninterrupted cloud operations
Resilience for uninterrupted cloud operations

Resilience capabilities for uninterrupted cloud operations: Zscaler Resilience extends the flexibility of the cloud platform and keeps each app connected for rapid recovery from unforeseen events or attacks. Zscaler announces Zscaler ResilienceTM, a service that brings new capabilities to extend the resiliency of Zscaler's architecture and operations, keeping users and devices connected to critical cloud-based applications. Built on the world's largest inline cloud security platform, these industry-first SSE capabilities enable rapid response to black swan events and keep customers running. App…

Read more

24 billion threats via SSL encryption
24 billion threats via SSL encryption

24 billion threats ran over encrypted channels using SSL such as HTTPS. The attack usually comes from malware that is transported via e-mail or infected websites. In Germany, this type of attack increased by 2021 percent compared to 352. The annual State of Encrypted Attacks report shows the trends of HTTPS-based attacks based on the analysis of more than 24 billion threats from October 2021 to September 2022. The research is based on insights from more than 300 trillion daily signals and 270 billion daily Transactions in the Zscaler…

Read more

Zero trust for cloud infrastructure underutilized
Zero trust for cloud infrastructure underutilized

As the study "Zero Trust-Transformation 2023" shows, 90 percent of global companies are already implementing or planning some form of zero trust in their cloud infrastructure, but they are not yet exploiting the full transformation potential. Zscaler releases its 2023 Zero Trust Transformation Global Study. As part of the survey, more than 90 percent of IT leaders who have already migrated to the cloud or are in the process of migrating said they have a Zero Trust security architecture in place, currently implementing or planning to implement. Cloud Infrastructure plus Zero Trust For such a massive migration…

Read more

Data protection: data protection without configuration
Data protection: data protection without configuration

Data protection innovations reduce security risks with faster deployment cycles and simplified operations. Zscaler improves enterprise data protection with industry-leading no-configuration data protection. Zscaler, Inc. announces data protection innovations that build on a long history of securing data in motion and at rest in cloud applications and BYOD resources. The new developments bring the greatest accuracy and scalability to data protection projects and reduce time-to-market to hours with zero-configuration functionality for Data Loss Prevention (DLP). By standardizing data protection across all channels and simplifying operations using the…

Read more

Remote access: VPN is out - Zero Trust is in
Remote access: VPN is out - Zero Trust is in

According to a survey, while many companies want to rely on zero trust, 95 percent of companies still use VPN to enable hybrid work and distributed work environments across branches. However, almost half of the companies also noticed the attacks on VPN. For decades, companies around the world have relied on VPN to secure remote access. For many IT security departments, going through a secure tunnel into the company network was the best way to protect the company from unauthorized access while still allowing employees remote access. But with the…

Read more

Dark Web: Quantum Builder produces RAT malware
B2B Cyber ​​Security ShortNews

The Quantum Builder is offered on the Dark Web and various variants of the Remote Access Trojan (RAT) Agent Tesla are distributed. Overall, the malware relies on LNK files (Windows shortcuts) to spread the Trojan. There is even a service package for cyber criminal partners. Agent Tesla, a .NET-based keylogger and remote access trojan (RAT) since 2014, is currently being distributed via a builder sold on the dark web called "Quantum Builder". Security researchers from the Zscaler ThreatlabZ team examined the current campaign and identified an evolution. Malware authors now rely on LNK files (Windows shortcuts) to propagate the payload, creating…

Read more

Fake pirated websites distribute Infostealer malware
B2B Cyber ​​Security ShortNews

Recently, security analysts from Zsacler ThreatLabZ team encountered Infostealer malware distribution campaigns on fake pirated content websites. Especially small companies that want to save money with pirated copies can get into bigger problems than if they bought the software. This type of distribution of malicious code is aimed at people who knowingly download a pirated copy from an illegal platform and therefore do not pay too much attention to what they are downloading to their hard drive in the background. In the case of the malware campaigns that have now been uncovered, they pay for this behavior by disclosing private information that…

Read more

How cyber criminals use malware against their competition
B2B Cyber ​​Security ShortNews

Most cyber criminals simply belong to criminal companies. And here, too, there is unwelcome competition. You can either use malware to access important information from other attackers or sell Malware-as-a-Service with a built-in back door so that you can access the data yourself. Zscaler looked at the backdoored malware against other cybercriminals. Stealing information is fundamental for cyber gangs to gain access to systems and initiate larger malware campaigns against companies. In a recent analysis of the Prynt Stealer malware, Zscaler's ThreatLabz security researchers found that theft of information…

Read more

Zcaler: Dangerous return from home office devices
B2B Cyber ​​Security ShortNews

The change of many employees to the home office at the beginning of the "Corona" contact restrictions was often hasty. Nicolas Casimir, "EMEA CISO" at Zscaler, warns that there is now a risk that devices infected with malicious code could compromise the security of the network when they return to the company. Employees could bring logic bombs into the company Casimir explains: “In IT security, a 'logic bomb' is malicious code that is smuggled into software or a system and whose function is only triggered if certain conditions are met. These 'time bombs' are used by viruses, worms, Trojans ...

Read more