Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Top 4 Industry 4.0 Challenges and How SASE Helps Manufacturers Overcome Them

Industry 4.0 is bringing technological and innovative advantages to the manufacturing industry. AI, IoT, and RPA, for example, are transforming and streamlining the design, production and distribution of products. But these advancements also bring new challenges for manufacturers. This blog post highlights four of the most prominent ones—based on real experiences from Cato’s manufacturing customers—and how SASE helps tackle them head-on.

OWASP Top 10 Vulnerabilities in 2021: How to Mitigate Them?

The OWASP Top 10 is a research-based document that raises awareness among developers, organizations, and security professionals on the most critical security risks facing web applications. The latest is the OWASP Top 10 vulnerabilities 2021, released in September 2021 after a 4-year gap. In this article, the OWASP Top 10 vulnerabilities 2021 are explained in detail, along with ways to mitigate each.

Top challenges for implementing multi-domain correlation in the cloud

Adversaries often use complex, multi-stage cloud attacks that evade traditional security measures, which struggle to fully visualize, prioritize, and respond to threats. Multi-domain correlation addresses this by analyzing data across diverse domains — including networks, applications, databases, and storage — to uncover potential weaknesses and attack paths across interconnected resources.

CVE-2024-8068 and CVE-2024-8069: Citrix Session Recording Vulnerability

Two Citrix vulnerabilities (CVE-2024-8068 and CVE-2024-8069) can potentially lead to unauthenticated remote code execution. Note: according to the vendor, privilege escalation to NetworkService Account access in Citrix Session Recording and limited remote code execution with privilege of a NetworkService Account access in Citrix Session Recording is possible when an attacker is an authenticated user in the same intranet.

Your AppSec Journey Demystified: Driving Effective API Security with Wallarm and StackHawk

There is no doubt that attackers have shifted their attention to APIs. Wallarm’s API ThreatStats research identifies that 70% of attacks now target APIs instead of Web Applications. While APIs have become the backbone of innovation and connectivity for businesses, they have also introduced a vast attack surface that’s challenging to defend with traditional methods alone.

Fireblocks Deepens Collaboration With the TON Foundation: Introducing Support for Jettons and $200k Grant Program

Secure access to the latest blockchains and their features is a core focus at Fireblocks, thereby empowering our customers to take advantage of new market opportunities and enhance their offerings. In the past year alone, we’ve added support for over twenty new blockchains, helping thousands of digital asset businesses to grow their revenue and expand their reach.

Celebrating growth and recognition for our channel partner program

At Tines, we’re proud to say we're partner-first. That means we collaborate closely with partners to deliver best-in-class workflow orchestration and automation, and empower customers to tackle their biggest security and IT challenges. In 2024, we took things a step further by introducing several new AI innovations - Automatic Mode, the AI Action, and Workbench - that enable us to power even more of the world’s most important workflows.

Top 9 Log Analysis Tools

Logs tell the hidden story of your IT infrastructure – what’s working, what’s breaking, and what could be under attack. You’re left sifting through a chaotic stream of events, risking missed insights crucial for maintaining security and operational stability. And the stakes couldn’t be higher. The average global data breach cost hit $4.45 million, with U.S. companies facing an even steeper $9.48 million per incident.

Evasive malware has grown by 168% causing direct impact on cybersecurity

With a 168% rise in evasive malware, cyber threats have reached a new level of sophistication. This type of malware employs advanced techniques to evade detection by traditional solutions, which often rely on pre-defined signatures to identify threats. These malicious programs pose a major challenge in cybersecurity by camouflaging themselves within legitimate processes and acting stealthily.