Blog da Zscaler

Receba as últimas atualizações do blog da Zscaler na sua caixa de entrada

Customer Stories

March 31, 2025
5 Min. de leitura

Securing Future Growth: How FICO Embraces the Cloud with Con...

Learn how Zscaler helps FICO secure its operations in the cloud, protecting sensitive workloads while enhancing performance and agility.
Ben Nelson
Photo Ben Nelson
Customer Blog Post featuring FICO

Security Research

March 20, 2025
6 Min. de leitura

AI in the Enterprise: Key Findings from the ThreatLabz 2025 ...

Learn 5 key findings from the Zscaler ThreatLabz 2025 AI Security Report.
Deepen Desai
Photo Deepen Desai
illuminated woman touching digital screen

Notícias e anúncios

April 25, 2024
5 Min. de leitura

A Zscaler Digital Experience acaba de ficar mais inteligente...

Apresentando um novo assistente de IA, mais telemetria e insights personalizados
Krishnan Badrinarayanan
Photo Krishnan Badrinarayanan
A Zscaler Digital Experience ficou mais inteligente e sábia: apresentando um novo assistente de IA, mais telemetria e insights personalizados

Products & Solutions

November 29, 2023
3 Min. de leitura

New to Zero Trust? Start Here

We want to provide that first step and make it easy for you to get started on this exciting journey of transitioning to a Zero Trust architecture.
Simon Tompson
Photo Simon Tompson
 New to Zero Trust? Start Here

Zscaler Life

February 02, 2023
2 Min. de leitura

Zscaler Is Proud to Be a 2023 Great Place to Work!

Great Place to Work is the global authority on workplace culture and employee experience
Brendan Castle
Photo Brendan Castle
Zscaler Is Proud to Be a 2023 Great Place to Work!

Computer motherboard and human head connected by glowing roots.

Pesquisa de segurança

PESQUISA DE AMEAÇA

Analyzing New HijackLoader Evasion Tactics

Leia agora

Photo Muhammed Irfan V A
Muhammed Irfan V A
March 31, 2025 | 12 Min. de leitura
A computer screen displaying source code with the Next.js logo atop the image.

Pesquisa de segurança

PESQUISA DE AMEAÇA

CVE-2025-29927: Next.js Middleware Authorization Bypass Flaw

Leia agora

Photo Varun Sandila
Varun Sandila
March 27, 2025 | 5 Min. de leitura
A steaming cup of coffee emitting green toxic smoke.

Pesquisa de segurança

PESQUISA DE AMEAÇA

CoffeeLoader: A Brew of Stealthy Techniques

Leia agora

Photo Brett Stone-Gross
Brett Stone-Gross
March 26, 2025 | 15 Min. de leitura
A digital background with CVE-2025-24813 text.

Pesquisa de segurança

PESQUISA DE AMEAÇA

CVE-2025-24813: Apache Tomcat Vulnerable to RCE Attacks

Leia agora

Photo Sakshi Aggarwal
Sakshi Aggarwal
March 21, 2025 | 4 Min. de leitura
illuminated woman touching digital screen

Pesquisa de segurança

PESQUISA DE AMEAÇA

AI in the Enterprise: Key Findings from the ThreatLabz 2025 AI Security Report

Leia agora

Photo Deepen Desai
Deepen Desai
March 20, 2025 | 6 Min. de leitura
A DeepSeek-like icon over blue digital waves.

Pesquisa de segurança

PESQUISA DE AMEAÇA

DeepSeek Lure Using CAPTCHAs To Spread Malware

Leia agora

Photo Rohit Hegde
Rohit Hegde
February 25, 2025 | 7 Min. de leitura
Computer chips stacked, glowing in the dark.

Pesquisa de segurança

PESQUISA DE AMEAÇA

Technical Analysis of Xloader Versions 6 and 7 | Part 2

Leia agora

Photo ThreatLabz
ThreatLabz
February 13, 2025 | 9 Min. de leitura
A glowing blue light weaving through a maze.

Pesquisa de segurança

PESQUISA DE AMEAÇA

Technical Analysis of Xloader Versions 6 and 7 | Part 1

Leia agora

Photo ThreatLabz
ThreatLabz
January 27, 2025 | 16 Min. de leitura

Receba as últimas atualizações do blog da Zscaler na sua caixa de entrada

Ao enviar o formulário, você concorda com nossa política de privacidade.