Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Top 5 Most Commonly Used IoT Protocols and Their Security Issues

What happens when devices meant to make your life easier become tools for intrusion? Your smart TV could become a surveillance device, your fitness tracker could leak your health data, and your connected car could be remotely hijacked. In the world of IoT vulnerabilities, the technology designed to serve you could turn against you. The Internet of Things promises convenience and connectivity. The risks of cyberattacks targeting these devices are growing exponentially.

Race to KEV Remediation: Who Tops the Charts in Europe?

In our global study of the CISA KEV Catalog, we uncovered widespread vulnerabilities and the swift pace at which threats evolve. As we dissect the layers of data from the report, it becomes evident that each country's unique approach to cybersecurity regulation, vulnerability management, and remediation presents distinct challenges and opportunities.

Bring-Your-Own-Data (BYOD) to the Kondukto Platform

During this year’s RSA conference in San Francisco, we announced our new exciting platform capability: “Bring-Your-Own-Data” (BYOD), which allows customers to integrate their unique data-streams into the Kondukto Platform. Integrating diverse sets of data has become critical for AppSec. “Bring-Your-Own-Data” drastically improves the visibility for security teams into the application security stack of complex environments.

The new normal of remote work and the need for Zero Trust

The COVID-19 pandemic triggered a seismic shift in how we work, propelling remote work from a niche option to the mainstream. Organizations scrambled to adapt, often prioritizing business continuity over security. However, as the dust settles, it's clear that this new normal of remote work isn't going anywhere. This presents a significant challenge: how do we secure a workforce that's no longer confined within the traditional office perimeter?

Enterprise Risk Management Failures: Insights from the Cencora Breach

In a significant cybersecurity incident, Cencora, a leading pharmaceutical services provider, experienced a data breach in February 2024, exposing sensitive patient information from 11 major pharmaceutical companies. This breach underscores the critical importance of robust enterprise risk management, vulnerability management, and endpoint security in protecting sensitive data and managing online reputation.

Penetration Testing of A.I. Models

Penetration testing is a cornerstone of any mature security program and is a mature and well understood practice supported by robust methodologies, tools, and frameworks. The tactical goals of these engagements typically revolve around identification and exploitation of vulnerabilities in technology, processes, and people to gain initial, elevated, and administrative access to the target environment.

Lost in the Fog: A New Ransomware Threat

On May 2, 2024, Arctic Wolf Labs began monitoring deployment of a new ransomware variant referred to as Fog. The ransomware activity was observed in several Arctic Wolf Incident Response cases, each exhibiting similar elements. All victim organizations were located in the United States, 80% of which were in the education sector and 20% in the recreation sector. We are sharing details of this emerging variant to help organizations defend against this threat.

What's at Stake if a Credit Union Is Breached?

The financial industry experienced the second-highest data breach cost in 2023, according to IBM. This includes breaches that affected credit unions as well as other financial institutions. But, despite costs, what else is at stake if a credit union is breached? If a credit union is breached, customer Personally Identifiable Information (PII) is at risk of being exposed and used for malicious purposes such as identity theft and fraud.

Deploying Cato SASE, Step by Step

It’s not uncommon for enterprises to find themselves in a situation where they’ve purchased new technology but are then faced with the hurdle of understanding what they’ve acquired and how to deploy it. This can often lead to confusion, deployment delays, and frustration with the new technology. Deploying the Cato SASE solution can be both simple and quick if you follow this checklist.