Zscaler Blog

Get the latest Zscaler blog updates in your inbox

Customer Stories

March 31, 2025
5 Min de lectura

Securing Future Growth: How FICO Embraces the Cloud with Con...

Learn how Zscaler helps FICO secure its operations in the cloud, protecting sensitive workloads while enhancing performance and agility.
Ben Nelson
Photo Ben Nelson
Customer Blog Post featuring FICO

Security Research

March 20, 2025
6 Min de lectura

AI in the Enterprise: Key Findings from the ThreatLabz 2025 ...

Learn 5 key findings from the Zscaler ThreatLabz 2025 AI Security Report.
Deepen Desai
Photo Deepen Desai
illuminated woman touching digital screen

Noticias y anuncios

April 25, 2024
5 Min de lectura

La experiencia digital de Zscaler se ha vuelto más inteligen...

Presentamos un nuevo asistente de IA, más telemetría e información personalizada
Krishnan Badrinarayanan
Photo Krishnan Badrinarayanan
Zscaler Digital Experience acaba de hacerse más inteligente y perspicaz: Presentamos un nuevo asistente de IA, más telemetría y perspectivas personalizadas

Products & Solutions

November 29, 2023
3 Min de lectura

New to Zero Trust? Start Here

We want to provide that first step and make it easy for you to get started on this exciting journey of transitioning to a Zero Trust architecture.
Simon Tompson
Photo Simon Tompson
 New to Zero Trust? Start Here

Zscaler Life

February 02, 2023
2 Min de lectura

Zscaler Is Proud to Be a 2023 Great Place to Work!

Great Place to Work is the global authority on workplace culture and employee experience
Brendan Castle
Photo Brendan Castle
Zscaler Is Proud to Be a 2023 Great Place to Work!

Computer motherboard and human head connected by glowing roots.

Investigación de Seguridad

INVESTIGACIÓN DE AMENAZAS

Analyzing New HijackLoader Evasion Tactics

Leer ahora

Photo Muhammed Irfan V A
Muhammed Irfan V A
March 31, 2025 | 12 Min de lectura
A computer screen displaying source code with the Next.js logo atop the image.

Investigación de Seguridad

INVESTIGACIÓN DE AMENAZAS

CVE-2025-29927: Next.js Middleware Authorization Bypass Flaw

Leer ahora

Photo Varun Sandila
Varun Sandila
March 27, 2025 | 5 Min de lectura
A steaming cup of coffee emitting green toxic smoke.

Investigación de Seguridad

INVESTIGACIÓN DE AMENAZAS

CoffeeLoader: A Brew of Stealthy Techniques

Leer ahora

Photo Brett Stone-Gross
Brett Stone-Gross
March 26, 2025 | 15 Min de lectura
A digital background with CVE-2025-24813 text.

Investigación de Seguridad

INVESTIGACIÓN DE AMENAZAS

CVE-2025-24813: Apache Tomcat Vulnerable to RCE Attacks

Leer ahora

Photo Sakshi Aggarwal
Sakshi Aggarwal
March 21, 2025 | 4 Min de lectura
illuminated woman touching digital screen

Investigación de Seguridad

INVESTIGACIÓN DE AMENAZAS

AI in the Enterprise: Key Findings from the ThreatLabz 2025 AI Security Report

Leer ahora

Photo Deepen Desai
Deepen Desai
March 20, 2025 | 6 Min de lectura
A DeepSeek-like icon over blue digital waves.

Investigación de Seguridad

INVESTIGACIÓN DE AMENAZAS

DeepSeek Lure Using CAPTCHAs To Spread Malware

Leer ahora

Photo Rohit Hegde
Rohit Hegde
February 25, 2025 | 7 Min de lectura
Computer chips stacked, glowing in the dark.

Investigación de Seguridad

INVESTIGACIÓN DE AMENAZAS

Technical Analysis of Xloader Versions 6 and 7 | Part 2

Leer ahora

Photo ThreatLabz
ThreatLabz
February 13, 2025 | 9 Min de lectura
A glowing blue light weaving through a maze.

Investigación de Seguridad

INVESTIGACIÓN DE AMENAZAS

Technical Analysis of Xloader Versions 6 and 7 | Part 1

Leer ahora

Photo ThreatLabz
ThreatLabz
January 27, 2025 | 16 Min de lectura

Get the latest Zscaler blog updates in your inbox

By submitting the form, you are agreeing to our privacy policy.