Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mitigating Credential Phishing in the Age of AI and Cloud Convergence

Phishing remains one of the most effective methods for stealing credentials and breaching enterprise environments. Despite advanced email and browser protections, attackers now leverage AI, and automation to outpace traditional defenses. The Verizon 2024 Data Breach Investigations Report found that 68% of breaches involve the human element, often triggered within seconds of a phishing lure, just 21 seconds to click and 28 seconds to submit credentials.

Cato CTRL Threat Brief: "React2Shell" Vulnerability Targeting React Server Components

On Wednesday, December 3, a critical remote code execution (RCE) vulnerability in React Server Components (RSC), dubbed React2Shell (CVE-2025-55182), was disclosed. The CVE was discovered by security researcher Lachlan Davidson. It quickly gained traction with multiple third-party proof of concepts (PoCs) being published of varying quality and credibility.

Rogue Devices on Your Network: How Hackers Stay Invisible

Cybercriminals and state-driven actors are getting smarter. Rogue devices, like stolen laptops or stealthy rogue routers, are bypassing traditional security measures and hiding in your network’s blind spots. In this discussion, experts Daniel dos Santos, VP of Forescout Research, Rik Ferguson, VP of Security Intelligence and Liran Chen, VP of Systems Engineering dive into.

Identify Unknown or Unapproved Devices: How Forward Networks Helps Strengthen Supply-Chain and Zero Trust Compliance

Modern enterprise and federal networks increasingly face challenges related to identifying and validating the hardware operating within their environments. While teams typically expect enterprise-grade devices from approved vendors, the broader hardware ecosystem often introduces components and equipment that do not originate from the organization’s procurement process.

The Role of Security in the Rise of Smart Business Connectivity

In today's fast-paced business environment, connectivity is no longer just a convenience; it is essential for professional growth and success. Businesses and individuals rely on smart tools to share information, collaborate, and expand their networks efficiently. However, as connectivity becomes more digital, security becomes increasingly important. Without proper safeguards, the benefits of smart business connectivity can turn into risks such as data breaches or identity theft.

How to React(.js) to React2Shell and detecting behaviors to catch the Next(.js) big RCE

Critical vulnerabilities in React Server Components (CVE-2025-55182) and Next.js (CVE-2025-66478) enable unauthenticated remote code execution in default configurations. The flaw resides in the "Flight" protocol used for server-side rendering, making it a sought after target for adversaries looking to bypass standard controls. While the public discourse is currently cluttered with unreliable exploits, we need to ground our defense in verifiable network evidence.

WatchGuard ThreatSync+ NDR Named Product of the Year by CRN 2025

We’re thrilled to announce that WatchGuard ThreatSync+ NDR has been named Winner Overall – Security: Network in CRN’s 2025 Products of the Year. This honor highlights not only the strength of the solution itself, but also how it aligns with, and accelerates, the major innovations shaping network security this year.

Episode 3 - Network Visibility in the Cloud: Why Network Traffic Analysis Remains Critical

Richard Bejtlich discusses cloud security from a network-centric perspective with Corelight's cloud security researcher, David Burkett. They explore why monitoring network traffic remains essential in cloud environments, despite the presence of native security features offered by cloud providers. David highlights common threats such as container compromises, coin miners, and supply chain attacks, emphasizing the value of traffic visibility for detecting unusual behaviors and breaches.

The Shadow AI reality: Inside Cato's survey results

AI tools have proved their worth in the workplace. They help us write, research, code, plan, and automate. They’re making employees faster and more productive, and helping businesses move and innovate at a pace that wasn’t possible before. But AI’s rise wasn’t orchestrated by IT. It didn’t always arrive through formal adoption plans or procurement cycles. It turned up in shared links to popular GenAI and other tools, self-sanctioned and adopted by users in minutes.