Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A New Security-Focused Path Search View for Faster, Clearer Analysis

Security teams frequently investigate whether traffic is allowed, denied, or translated along a path, but traditional visualization methods create unnecessary complexity. A standard Path Search view includes every L2 and L3 hop—switches, routers, and intermediary devices that participate in forwarding but apply no security policy. While this depth is helpful for network troubleshooting, it overwhelms analysts focused specifically on enforcement points.

Why Your Security Camera Keeps Losing Connection and How to Fix It Permanently

Nothing is as annoying as opening your security camera app and realizing that it turned out to be offline. You have the camera there so that you can be at peace but you always find yourself asking the question as to whether the camera is really recording or it is just sitting there doing nothing. When your security camera continues to lose its connection, you are not alone and more importantly, the problem can normally be solved.

Can Manufacturing Defects Really Compromise Your Network's Data?

Whenever we consider network security, it tends to cross our mind that we are dealing with hackers, malware or poor passwords. However, there is a less conspicuous danger that never makes the news: the physical elements that constitute your network infrastructure. In particular, the printed circuit boards (PCBs) that drive your routers, switches, and servers may have manufacturing defects that open holes in your security that you never thought of.

10 Security Risks Solved by Modern Mobile Enterprise Solutions 

In today's digitally driven business landscape, the proliferation of mobile devices has unlocked unprecedented productivity and flexibility. However, this shift has also introduced a complex array of security vulnerabilities that legacy IT infrastructures are ill-equipped to handle. From unsecured endpoints to data leakage, organizations can face significant threats that can compromise sensitive information and operational integrity.

Common ICT infrastructure Mistakes That Weaken Security

A robust digital infrastructure is the backbone of modern organizational resilience. Yet, foundational missteps in designing and maintaining IT infrastructure create pervasive vulnerabilities, undermining security postures and business continuity. Here are the common mistakes that dangerously weaken security.

CVE-2025-64155: FortiSIEM Remote Unauthenticated Command Injection Vulnerability

On January 13, 2025, Fortinet released fixes for a critical-severity FortiSIEM vulnerability (CVE-2025-64155) that stems from improper neutralization of special elements used in OS commands within the phMonitor service (TCP/7900). An unauthenticated, remote threat actor can exploit this vulnerability via crafted TCP requests to execute unauthorized code or commands on affected systems.

Cato Networks Joins ISC2 as an Official CPE Partner

Cato Networks’ SASE certification portfolio has taken a major step forward with Cato’s official recognition as an ISC2 Continuing Professional Education (CPE) Partner. ISC2 is one of the most trusted names in cybersecurity, representing more than 500,000 members worldwide. Their certifications are widely regarded as the benchmark for professional excellence in security.

What Is the Best Security for NGINX in Kubernetes? (Beyond Configuration)

The best security combines configuration controls (TLS, headers, network policies, pod security) with runtime behavioral monitoring that detects anomalies your configuration can’t see. Configuration creates the baseline—it defines what should happen. Runtime protection catches what gets through—it shows what is happening. You need both, but most teams only have the first.

Episode 6 - Detecting DNS Covert Channels in the Wild (Part 2)

In Episode 6 of Corelight DefeNDRs, we delve deeper into the fascinating world of DNS covert channels with Vern Paxson, our chief scientist and co-founder. Continuing from our previous discussion, Vern shares his insights on techniques developed to detect these stealthy channels utilized by intruders to evade security measures. We explore the innovative approach of leveraging time series analysis of DNS lookups, how to distinguish benign traffic from potential threats, and the real-world implications of our findings across significant datasets.