Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

POAM Process Automation: Breaking the Manual Grind

Plans of Action and Milestones (POAM) play a critical role in public sector cybersecurity. In this webinar with government IT solutions provider Carahsoft, we break down the challenges security teams face when implementing POAMs, sharing real-life examples of where things go wrong and why. As part of the presentation, we also cover the intensive math of POAM programs: people, systems, and time.

March 24, 2025 Cyber Threat Intelligence Briefing

March 24, 2025 Cyber Threat Intelligence Briefing This week’s briefing covers: KTA134 (BLACKBASTA) Chats Suggests Help From Russian Officials Upon review of leaked chat logs, it appears that KTA248 (Oleg Nefedov, GG, Tramp, Kurva) was able to evade trial by eliciting the help of Russian government officials. Supply Chain Attack Leaks Secrets from GitHub A supply chain attack on the popular GitHub Action tj-actions/changed-files caused many repositories to leak their secrets over the weekend.

Ultimate Guide: Leveraging Intelligence to Prevent Card Fraud

Card fraud is evolving—fast. With unauthorised payment card fraud surpassing £275 million in the first half of 2024, businesses face increasing financial and reputational risks. Fraudsters steal physical cards, breach databases, and exploit digital channels, making fraud a low-risk, high-reward crime. The consequences? Lost revenue, customer trust, and compliance fines, with the average UK data breach now costing £3.5 million.

Why Principle of Least Privilege Matters More Than Ever in a World of Backdoored Large Language Models (LLMs)

The concept of “principle of least privilege” has been around for a long time. In fact, it is older than me; there are papers from the 70s that discuss it: “Every program and every user of the system should operate using the least set of privileges necessary to complete the job.” (The protection of information in computer systems, Saltzer and Schroeder, 1974).

Streamline MSP operations: Application Control and OS Deployment features launched in Endpoint Central MSP Cloud

The landscape of managed service providers (MSPs) is constantly evolving, demanding greater efficiency and robust security. Today, we’re thrilled to announce a significant leap forward in our cloud-based MSP software: the release of Application Control and OS Deployment features in Endpoint Central MSP Cloud.

The Prime Cyber Battleground- How Hacktivists and APTs Are Intensifying Attacks

]India has emerged as the globe's number one cyberattack target, with advanced persistent threat (APT) groups and hacktivist groups escalating their cyber assaults. From denial-of-service (DDoS) attacks to high-profile data breaches, cybercriminals are exploiting vulnerabilities in India's rapidly digitizing landscape.

Nation-State Threat Actors Leverage Windows Shortcut Vulnerability

The newly found Windows shortcut vulnerability is now being actively exploited by state-sponsored Advanced Persistent Threat (APT) actors to execute covert malicious commands. According to new research conducted by Trend Micro's Zero Day Initiative (ZDI), the vulnerability, designated as ZDI-CAN-25373, is now being exploited by Chinese, Iranian, North Korean, and Russian threat actors for worldwide cyber espionage and data theft.

Google's $32B Multicloud Security Bet: What the Wiz Deal Means to the Market

In a record-breaking transaction that reflects the increasing importance of multicloud security, Google is to acquire cloud security giant Wiz in a whopping $32 billion all-cash deal. The largest deal by Google so far, the buyout marks a seismic step ahead in its cloud security offerings. As cyber threats continue to evolve at a record pace, businesses are looking for better, AI-driven solutions to protect their cloud-based digital properties.

Cato Networks Earns First-Ever 5-Star Rating in 2025 CRN Partner Program Guide

Today, Cato Networks has been honored by CRN with a 5-Star Award in the 2025 CRN Partner Program Guide. This annual guide is an essential resource for solution providers seeking vendor partner programs that match their business goals and deliver high partner value. This is the first time Cato has received a 5-star rating for our global partner program and that’s because we empower our partners to deliver a best-in-class SASE platform to customers.