Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Zscaler Acquires Enterprise AI Security Firm SPLX to Boost Zero Trust Exchange

Zscaler Acquires Enterprise AI Security Firm SPLX to Boost Zero Trust Exchange

Posted on November 4, 2025November 4, 2025 By CWS

Zscaler, a number one cloud safety firm, has introduced the acquisition of SPLX, an revolutionary AI safety agency, to reinforce its Zero Belief Change platform with superior synthetic intelligence safety capabilities.

The acquisition goals to assist organizations safe their AI investments all through your entire growth and deployment lifecycle.

The mixing of SPLX’s know-how into Zscaler’s platform will allow organizations to shift left with AI asset discovery, automate crimson teaming, and implement sturdy governance instruments.

Zscaler emphasised that whereas AI creates large worth, its potential can solely be totally realized when correctly secured.

Complete AI Safety Improvement

By combining SPLX’s superior know-how with Zscaler’s Zero Belief Change intelligence and native knowledge safety, the corporate will safe the whole AI lifecycle on a single unified platform.

With AI infrastructure investments projected to exceed $250 billion by the tip of 2025, firms are confronting a quickly increasing assault floor and growing shadow AI sprawl.

Repeatedly evolving fashions, brokers, and huge language fashions require ongoing discovery, danger evaluation, and remediation to keep up safety.

SPLX brings specialised experience in AI crimson teaming, asset administration, menace inspection, immediate hardening, and governance to Zscaler’s current capabilities.

The improved platform will characteristic AI asset discovery that extends past public generative AI purposes to incorporate fashions, workflows, code repositories, and Mannequin Context Protocol servers in each private and non-private deployments.

The answer contains automated AI crimson teaming with over 5,000 purpose-built assault simulations designed to determine dangers and vulnerabilities from growth by way of manufacturing, providing real-time remediation.

Moreover, the platform expands Zscaler’s present AI Runtime Guardrails to guard delicate knowledge and block malicious assaults between AI purposes and huge language fashions, together with agentic workflows.

SPLX expressed pleasure about becoming a member of forces with Zscaler to handle the huge assault floor created by quickly increasing AI infrastructure investments.

The partnership will ship SPLX’s innovation by way of one of many world’s most trusted safety platforms, securing AI innovation on the tempo organizations are adopting it.

The acquisition strengthens Zscaler’s place as a trusted associate for organizations looking for to securely undertake AI applied sciences.

With complete AI governance and compliance help, the improved platform permits organizations to shift from reactive protection to proactive safety of their precious AI investments whereas assembly regulatory necessities and governance frameworks.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Acquires, Boost, Enterprise, Exchange, Firm, Security, SPLX, Trust, Zscaler

Post navigation

Previous Post: Threat Actors Leverage RMM Tools to Hack Trucking Companies and Steal Cargo Freight
Next Post: Bugcrowd Acquires Application Security Firm Mayhem

Related Posts

CISA Releases BRICKSTORM Malware Report with New YARA Rules for VMware vSphere CISA Releases BRICKSTORM Malware Report with New YARA Rules for VMware vSphere Cyber Security News
Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications Cyber Security News
Microsoft SQL Server 0-Day Vulnerability Exposes Sensitive Data Over Network Microsoft SQL Server 0-Day Vulnerability Exposes Sensitive Data Over Network Cyber Security News
Google’s AI Tool Big Sleep Uncovered Critical SQLite 0-Day Vulnerability and Blocks Active Exploitation Google’s AI Tool Big Sleep Uncovered Critical SQLite 0-Day Vulnerability and Blocks Active Exploitation Cyber Security News
1inch partners with Innerworks to strengthen DeFi security through AI-Powered threat detection 1inch partners with Innerworks to strengthen DeFi security through AI-Powered threat detection Cyber Security News
Seraphic Security Unveils BrowserTotal™ – Free AI-Powered Browser Security Assessment For Enterprises Seraphic Security Unveils BrowserTotal™ – Free AI-Powered Browser Security Assessment For Enterprises Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News