Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cato CTRL Threat Research: New Streamlit Vulnerability Enables Cloud Account Takeover Attack and Stock Market Dashboard Tampering

Imagine financial analysts watching stock prices suddenly drop. Dashboards show misaligned data, market confidence disappears, and trading screens across the NASDAQ turn red. But this time, the disruption isn’t caused by politics or economic shifts. It starts with a cyberattack. We reveal how a simple and overlooked flaw in Streamlit’s file upload feature, part of a widely used open-source framework for building stock market dashboards, could be used to cause this kind of financial chaos.

ZTNA Alone Won't Win the Zero Trust Race. Here's Why.

In the race to secure modern enterprises, Zero Trust Network Access (ZTNA) is gaining speed, and has become the default remote access solution for many enterprises. But while ZTNA is a fabulous on-ramp to Zero Trust and a broader security strategy, it’s not enough to secure the win on its own. Operationalizing Zero Trust requires takes than just access control. It requires a security platform play: convergence, continuous risk evaluation, and visibility across every edge.

Cato CTRL Threat Brief: "ToolShell" Exploit Targeting Microsoft SharePoint Vulnerabilities

On July 22, 2025, Microsoft published an overview of a series of critical vulnerabilities affecting Microsoft SharePoint Server (CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE-2025-53771). These vulnerabilities opened a dangerous window for threat actors to gain access to internal resources, execute code remotely, and take over SharePoint deployments.

Cato CTRL Threat Research: Analyzing LAMEHUG - First Known LLM-Powered Malware with Links to APT28 (Fancy Bear)

On July 17, 2025, Ukraine’s Computer Emergency Response Team (CERT-UA) publicly reported LAMEHUG, which is being documented as the first known malware that integrates large language model (LLM) capabilities directly into its attack methodology.

Inside Qubit Conference Prague 2025: Hacking Social Platforms and Securing AI

Qubit Conference Prague 2025 brought together some of the sharpest minds in cybersecurity—and Cato CTRL made sure to leave a mark. Not only did we share insights on AI-powered security, but we also marked a major milestone: the opening of our new R&D office in Prague. This expansion strengthens our global footprint and taps the best in the local engineering and development talent to help with the kinds of projects we present at Qubit.

Cato CTRL Threat Research: Investigation of RMM Tools Leveraged by Ransomware Gangs in Real-World Incidents

Remote Monitoring and Management (RMM) tools are essential for IT operations, but their powerful capabilities and trusted status within enterprise networks have also made them valuable to threat actors. In the second half of 2024 and first quarter of 2025, we uncovered a recurring pattern during a series of cyber forensic investigations and threat detections impacting two US-based organizations and one UK-based organization.

Cato CTRL Threat Actor Profile: IntelBroker

In June 2025, FBI New York and the U.S. Attorney’s Office for the Southern District of New York announced charges against “IntelBroker,” the online persona of 25-year-old British national Kai Logan West. IntelBroker operated one of the most sophisticated data brokerage operations documented in the recent history of cybercrime.

A Leader Once Again: Cato Networks Recognized in 2025 Gartner Magic Quadrant for SASE Platforms

For the second consecutive year, Cato Networks has been recognized as a Leader in the 2025 Gartner Magic Quadrant for SASE Platforms. We believe this recognition validates our relentless commitment to innovation, excellence, and above all, our customers’ success. In a fiercely competitive landscape, we know that standing out means building SASE the right way, from the ground up, designed specifically for the needs of modern enterprises.

Cato's Unique ZTNA Broker Architecture - A Difference That Matters!

Zero Trust Network Access (ZTNA) has rapidly become a foundational security strategy for organizations modernizing their IT infrastructure. The increasing distribution of users, devices, and applications makes traditional security measures inadequate. Several solutions offer cloud-based brokers to implement ZTNA, but it’s crucial to understand that these solutions are not created equal. Let’s explore why Cato Networks’ cloud-based ZTNA solution distinctly stands apart.

Cato CTRL Threat Research: Overview of BloodHound and Associated Collectors Including ShadowHound, SharpHound, and SoapHound

Think back to when you were a kid, eyeing a cookie jar on the top shelf. Getting to it wasn’t just about reaching; it was about strategy. You had to avoid making noise, pick the sturdiest route, and time your move perfectly to avoid getting caught. Imagine having a team of expert scouts feeding you all the correct information: where the dangers are, which surfaces can support you, and the best way to grab that prize unnoticed. That’s exactly what BloodHound does.