Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2025

Why Independent Security Testing Matters: Lessons from Cato SASE's Efficacy Evaluation

As adults, we rarely question the safety of the medicine we consume. This confidence stems from knowing that these products undergo rigorous, independent testing before reaching pharmacy shelves. Security solutions, especially those critical to enterprise operations, deserve the same level of scrutiny. Before trusting a platform to safeguard our data and systems, it’s essential to verify that it can counter the sophisticated threats we face today.

Cato CTRL Threat Research: Unmasking Hellcat - Not Your Average Ransomware Gang

There’s a new ransomware gang targeting critical infrastructure, government organizations, educational institutions, and energy sectors. Their name? Hellcat. But who exactly are they? Hellcat is a new ransomware gang that has surfaced across dark web forums in 2024. Hellcat employs a ransomware-as-a-service (RaaS) model, offering ransomware tools and infrastructure to affiliates in exchange for a share of the profits.

The New Cato Trust Center: An Essential Step for Today's Interconnected Enterprise

Transparency in security practices is essential for building trust in today’s interconnected digital world. Organizations that openly share certifications, audit reports, and policies demonstrate a commitment to safeguarding data and adhering to standards. This openness fosters stronger partnerships and sets a benchmark for accountability.

Under Siege: Ransomware and Healthcare

It’s becoming all too common these days: ransomware hitting another organization. However, most people don’t know exactly what happens when ransomware is found and what must be addressed. What makes it even more challenging for healthcare is that the data that can be stolen, like personal health information, is much more valuable than credit card numbers.

TLS Inspection Made Safe & Simple: A Game-Changer from Cato!

Experience how Cato Networks' revolutionary Safe TLS Inspection eliminates the complexity of inspecting encrypted traffic without impacting performance or user experience. In this demo, see how Cato’s data-driven, automated approach selectively inspects only safe-to-inspect traffic, enabling organizations to uncover hidden threats, prevent data leaks, and fully leverage advanced security features like CASB and DLP. Discover how simple it is to activate this game-changing feature, unleashing the full potential of the Cato SASE Cloud with just a few clicks.

Cato CTRL Threat Brief: CVE-2024-49112 and CVE-2024-49113 - Windows LDAP Vulnerabilities ("LDAPBleed" and "LDAPNightmare")

In a world where dozens of CVEs are released every day, there are vulnerabilities, and there are vulnerabilities. The latest Microsoft Windows LDAP (Lightweight Directory Access Protocol) vulnerabilities, which were coined not once but twice (“LDAPBleed” and “LDAPNightmare”), clearly belong to the shortlist of new and dangerous CVEs.

Breaking Through Barriers: Cato's Solution for Seamless China Connectivity

Enterprises expanding their operations often face the challenge of also ensuring seamless and secure connectivity in China, a critical market with unique regulatory and network challenges. Businesses entering this vast market often face three primary obstacles: These challenges can hinder productivity, stall digital transformation, and overwhelm IT teams. The question is clear: how can enterprises achieve secure, seamless, and compliant connectivity in this complex digital environment?