Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Digital Gift Cards and Cybersecurity: Ensuring Safe Transactions in the Digital Age

There are numerous ways for people to pay for products, from traditional methods such as cash or credit cards to gift cards and cryptocurrencies. Interestingly, hackers have found ways to access and misuse each of these methods. Gift cards are a wholesome idea—there’s nothing better than receiving one from your favorite store. However, even gift cards aren’t completely safe. This doesn’t mean you should ignore a gift card you received as a present.

Salt Security Addresses Critical OAuth Vulnerabilities Enhancing API Security with OAuth Protection Package

OAuth is an important part of modern authorization frameworks, granting access to resources across different applications easily. However, vulnerabilities in OAuth implementations can create significant security risks. Following research released by Salt labs that uncovered critical vulnerabilities in the world's most popular authorization mechanism, Salt has released a multi-layered protection package to detect attempts to exploit OAuth and proactively fix the vulnerabilities.

5 Best Open Source Application Security Security Tools in 2024

As cybersecurity becomes increasingly important in software development, the “shift left” security approach is widely recognized as a best practice for ensuring superior application security. Numerous traditional security firms are introducing shift-left products and capabilities, and the concept is gaining traction. However, some open source application security tools are more developer-friendly than others.

New Drill Down Feature Illuminates a Deeper View of Cyber Risk Drivers

‍The power of an on-demand cyber risk quantification (CRQ) platform lies in its ability to harness an extensive amount of data, filter it, and consequently produce an objective assessment that offers key stakeholders an understanding of how likely their organization is to experience certain cyber events, along with the respective financial losses.

How to Update and Patch Windows Hyper-V Hosts and Clusters

Keeping Windows Server systems updated with the latest patches is one of the key things that administrators can do to ensure their Windows Server environments are stable and secure. Patching is one of the necessary evils that administrators need to manage to keep Windows, Linux, and other environments healthy. Hyper-V hosts are part of the infrastructure that also needs to be kept updated.

Cato CTRL: A New Vision in Extended Threat Intelligence Reporting

Over the past twenty years, I have navigated a unique journey through the cybersecurity landscape. My path has taken me from the realms of hacking and academia into the heart of threat intelligence (TI), culminating in my current role. Since I joined Cato in 2021, I’ve been leading security strategy and am proud to share the culmination of Cato’s research efforts in Cyber Threat Research Lab (Cato CTRL), our cyber threat research team.

Hunting Impacket: Part 2

Welcome back. This is part two of our blog series covering the Impacket example tools. Impacket is a collection of Python classes focused on providing tools to understand and manipulate low-level network protocols. This capability enables you to craft or decode packets of a wide variety of protocols such as IP, TCP, UDP, ICMP, and even higher-level protocols like SMB, MSRPC, NetBIOS, and others.