Blog da Zscaler

Receba as últimas atualizações do blog da Zscaler na sua caixa de entrada

Security Research

March 20, 2025
6 Min. de leitura

AI in the Enterprise: Key Findings from the ThreatLabz 2025 ...

Learn 5 key findings from the Zscaler ThreatLabz 2025 AI Security Report.
Deepen Desai
Photo Deepen Desai
illuminated woman touching digital screen

A computer screen displaying source code with the Next.js logo atop the image.

Pesquisa de segurança

Pesquisa da Threatlabz

CVE-2025-29927: Next.js Middleware Authorization Bypass Flaw

Leia agora

Photo Varun Sandila
Varun Sandila
March 27, 2025 | 5 Min. de leitura
AI-Driven Threat Detection: Revolutionizing Cyber Defense

Products & Solutions

Proteger dados

AI-Driven Threat Detection: Revolutionizing Cyber Defense

Leia agora

Photo Matt McCabe
Matt McCabe
March 27, 2025 | 8 Min. de leitura
A steaming cup of coffee emitting green toxic smoke.

Pesquisa de segurança

Pesquisa da Threatlabz

CoffeeLoader: A Brew of Stealthy Techniques

Leia agora

Photo Brett Stone-Gross
Brett Stone-Gross
March 26, 2025 | 15 Min. de leitura
Shadow AI: A Growing Threat to Corporate Data Security

Products & Solutions

Proteger dados

Shadow AI: A Growing Threat to Corporate Data Security

Leia agora

Photo Steve Grossenbacher
Steve Grossenbacher
March 25, 2025 | 5 Min. de leitura
Can AI Detect and Mitigate Zero Day Vulnerabilities?

Products & Solutions

Proteger dados

Can AI Detect and Mitigate Zero Day Vulnerabilities?

Leia agora

Photo Matt McCabe
Matt McCabe
March 24, 2025 | 6 Min. de leitura
A digital background with CVE-2025-24813 text.

Pesquisa de segurança

Pesquisa da Threatlabz

CVE-2025-24813: Apache Tomcat Vulnerable to RCE Attacks

Leia agora

Photo Sakshi Aggarwal
Sakshi Aggarwal
March 21, 2025 | 4 Min. de leitura
illuminated woman touching digital screen

Pesquisa de segurança

Pesquisa da Threatlabz

AI in the Enterprise: Key Findings from the ThreatLabz 2025 AI Security Report

Leia agora

Photo Deepen Desai
Deepen Desai
March 20, 2025 | 6 Min. de leitura
abstract image to show zero trust architecture

Products & Solutions

Arquitetura de zero trust

Why Zero Trust Architecture Is Superior to Traditional Security Models

Leia agora

Photo Jacob Serpa
Jacob Serpa
March 18, 2025 | 8 Min. de leitura

Receba as últimas atualizações do blog da Zscaler na sua caixa de entrada

Ao enviar o formulário, você concorda com nossa política de privacidade.