Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Naver Deception: Analyzing Quasar RAT's Distribution through a Popular South Korean Platform

Quasar RAT, also known as xRAT, is a malicious remote access trojan (RAT) that primarily targets Windows systems. Developed as an open-source project around 2015, it quickly garnered attention in the cybersecurity community due to its flexibility and ease of modification. Quasar RAT allows cybercriminals to gain unauthorized remote access to infected computers, making it a potent tool for espionage and theft. How Quasar RAT Operates.

Creating a Big Security Culture With a Tiny Button

When it comes to creating a strong cybersecurity culture, one of the most powerful tools we have at our disposal is the Phish Alert Button (PAB). This unassuming little add-in for your email client can make all the difference between falling victim to a malicious email and stopping a potential cyber attack in its tracks. And yet, many employees hesitate to use it, fearing the embarrassment of being wrong. I've been there myself.

Sentinels of Ex Machina: Defending AI Architectures

The introduction, adoption, and quick evolution of generative AI has raised multiple questions about implementing effective security architecture and the specific requirements for protecting all aspects of an AI environment as more and more organizations begin using this technology. Recent security reports on vulnerabilities that expose Large Language Model (LLM) components and jailbreaks for bypassing prompting restrictions have further shown the need for AI defenses.

The Role of Automation in Managed File Transfer: Streamlining Workflows

In an era where efficiency and security are paramount, automation has become a critical component of Managed File Transfer (MFT) solutions. Automation in MFT streamlines workflows, reduces manual intervention, and ensures that file transfers are executed consistently and securely. This article delves into the role of automation in MFT and how it contributes to streamlined business operations.

How Cato's Managed SASE simplifies delivery of SASE to customers for our partners

How can our partners simplify delivery of SASE to their customers? We’re not leaving you to figure that out alone. MSASE (Managed SASE) was designed to make SASE delivery easier and better. Cato’s Sr. Director of Product Marketing, Sangita Patel, explains the idea behind our new offering.

Shield your acquisitions: security strategies for the 2024 M&A market

After economic headwinds caused a downswing in corporate mergers and acquisitions, analysts are projecting an increase in activity in the second half of 2024. This uptick in activity, however, will feature different trends due to the current economic and regulatory climate, with big implications for information security. Read on to learn more about projected shifts in acquisition strategy and the implications for information security!

Automatic visibility: the key to a more proactive data security program

In today’s rapidly evolving digital landscape, the ability to see, understand, and control data movement within an organization is more critical than ever. Cyberhaven’s customers are turning to our Data Detection and Response (DDR) platform to power their data security programs, moving away from legacy solutions that fail to offer comprehensive visibility. Cyberhaven stands out by providing unmatched insights into data usage and movement across every part of an organization.