Zscaler Blog

Get the latest Zscaler blog updates in your inbox

Subscribe

Aneeth S

Principal Technical Product Specialist - SWG

Computer motherboard and human head connected by glowing roots.

Security Research

Threat Research

Analyzing New HijackLoader Evasion Tactics

Read now

Photo Muhammed Irfan V A
Muhammed Irfan V A
March 31, 2025 | 12 min read
A computer screen displaying source code with the Next.js logo atop the image.

Security Research

Threat Research

CVE-2025-29927: Next.js Middleware Authorization Bypass Flaw

Read now

Photo Varun Sandila
Varun Sandila
March 27, 2025 | 5 min read
A steaming cup of coffee emitting green toxic smoke.

Security Research

Threat Research

CoffeeLoader: A Brew of Stealthy Techniques

Read now

Photo Brett Stone-Gross
Brett Stone-Gross
March 26, 2025 | 15 min read
A digital background with CVE-2025-24813 text.

Security Research

Threat Research

CVE-2025-24813: Apache Tomcat Vulnerable to RCE Attacks

Read now

Photo Sakshi Aggarwal
Sakshi Aggarwal
March 21, 2025 | 4 min read
illuminated woman touching digital screen

Security Research

Threat Research

AI in the Enterprise: Key Findings from the ThreatLabz 2025 AI Security Report

Read now

Photo Deepen Desai
Deepen Desai
March 20, 2025 | 6 min read
A DeepSeek-like icon over blue digital waves.

Security Research

Threat Research

DeepSeek Lure Using CAPTCHAs To Spread Malware

Read now

Photo Rohit Hegde
Rohit Hegde
February 25, 2025 | 7 min read
Computer chips stacked, glowing in the dark.

Security Research

Threat Research

Technical Analysis of Xloader Versions 6 and 7 | Part 2

Read now

Photo ThreatLabz
ThreatLabz
February 13, 2025 | 9 min read
A glowing blue light weaving through a maze.

Security Research

Threat Research

Technical Analysis of Xloader Versions 6 and 7 | Part 1

Read now

Photo ThreatLabz
ThreatLabz
January 27, 2025 | 16 min read

Get the latest Zscaler blog updates in your inbox

By submitting the form, you are agreeing to our privacy policy.