Zscaler Blog

Get the latest Zscaler blog updates in your inbox

Security Research

March 20, 2025
6 Lesezeit: Min

AI in the Enterprise: Key Findings from the ThreatLabz 2025 ...

Learn 5 key findings from the Zscaler ThreatLabz 2025 AI Security Report.
Deepen Desai
Photo Deepen Desai
illuminated woman touching digital screen

A computer screen displaying source code with the Next.js logo atop the image.

Security Research

ThreatLabZ Research

CVE-2025-29927: Next.js Middleware Authorization Bypass Flaw

Jetzt lesen

Photo Varun Sandila
Varun Sandila
März 27, 2025 | 5 Lesezeit: Min
AI-Driven Threat Detection: Revolutionizing Cyber Defense

Produkte & Lösungen

Sicherheit für Ihre Daten

AI-Driven Threat Detection: Revolutionizing Cyber Defense

Jetzt lesen

Photo Matt McCabe
Matt McCabe
März 27, 2025 | 8 Lesezeit: Min
A steaming cup of coffee emitting green toxic smoke.

Security Research

ThreatLabZ Research

CoffeeLoader: A Brew of Stealthy Techniques

Jetzt lesen

Photo Brett Stone-Gross
Brett Stone-Gross
März 26, 2025 | 15 Lesezeit: Min
Shadow AI: A Growing Threat to Corporate Data Security

Produkte & Lösungen

Sicherheit für Ihre Daten

Shadow AI: A Growing Threat to Corporate Data Security

Jetzt lesen

Photo Steve Grossenbacher
Steve Grossenbacher
März 25, 2025 | 5 Lesezeit: Min
Can AI Detect and Mitigate Zero Day Vulnerabilities?

Produkte & Lösungen

Sicherheit für Ihre Daten

Can AI Detect and Mitigate Zero Day Vulnerabilities?

Jetzt lesen

Photo Matt McCabe
Matt McCabe
März 24, 2025 | 6 Lesezeit: Min
A digital background with CVE-2025-24813 text.

Security Research

ThreatLabZ Research

CVE-2025-24813: Apache Tomcat Vulnerable to RCE Attacks

Jetzt lesen

Photo Sakshi Aggarwal
Sakshi Aggarwal
März 21, 2025 | 4 Lesezeit: Min
illuminated woman touching digital screen

Security Research

ThreatLabZ Research

AI in the Enterprise: Key Findings from the ThreatLabz 2025 AI Security Report

Jetzt lesen

Photo Deepen Desai
Deepen Desai
März 20, 2025 | 6 Lesezeit: Min
abstract image to show zero trust architecture

Produkte & Lösungen

Zero-Trust-Architektur

Why Zero Trust Architecture Is Superior to Traditional Security Models

Jetzt lesen

Photo Jacob Serpa
Jacob Serpa
März 18, 2025 | 8 Lesezeit: Min

Get the latest Zscaler blog updates in your inbox

By submitting the form, you are agreeing to our privacy policy.