Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cato CTRL Threat Brief: "ToolShell" Exploit Targeting Microsoft SharePoint Vulnerabilities

On July 22, 2025, Microsoft published an overview of a series of critical vulnerabilities affecting Microsoft SharePoint Server (CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE-2025-53771). These vulnerabilities opened a dangerous window for threat actors to gain access to internal resources, execute code remotely, and take over SharePoint deployments.

Advanced attacks: EDR alone is not sufficient

Your best defense against advanced attacks is your network. SOC teams need comprehensive network data to defend against attacks. Corelight combines industry-leading Zeek network metadata, multi-layered detections, packet capture (PCAP), and file analysis (YARA) for the best approach to network-driven defense. Disrupt attacks, address gaps within your security stack, and reduce risk to your organization with Corelight's NDR solution.

Strengthen Security Strategy Without Expanding Your Team: How Network Digital Twins Empower Smarter Cyber Defense

Cybersecurity is no longer just a tech issue—it's a priority that sits right at the boardroom table. With escalating cyberattacks that are becoming both more frequent and complex, the pressure is on for CIOs and CISOs. The implications of not having clear visibility into our networks can be dire. According to Cybersecurity Ventures, the financial toll of cybercrime could reach a staggering $9.5 trillion by 2024—almost three times what it was in 2015.

How to Scale Fidelis Deception Across Growing IoT Networks: A Practical Guide

As IoT deployments continuously expand and evolve, traditional signature-based defenses struggle to keep pace, leaving Zero-Day exploits and APTs free to roam across billions of devices. Without deep visibility into device traffic and real-time behavioral analysis, security teams are blind to stealthy attacks hiding in plain sight—risking data theft, service disruption, and costly compliance breaches.

How to Stay Anonymous Online: Temporary Numbers, VPNs, Proxies, and More

Is the internet a safe place? Not when it comes to your personal information. Every time you browse a website, sign up for an app, or enter your phone number, you leave behind digital traces that can be tracked, sold, or stolen. From spam and phishing scams to identity theft and online harassment, the risks are real - and you don't have to be a high-profile target to be affected. Just being visible is enough.

Cato CTRL Threat Research: Analyzing LAMEHUG - First Known LLM-Powered Malware with Links to APT28 (Fancy Bear)

On July 17, 2025, Ukraine’s Computer Emergency Response Team (CERT-UA) publicly reported LAMEHUG, which is being documented as the first known malware that integrates large language model (LLM) capabilities directly into its attack methodology.

5 proven ways to secure your hybrid network environment during team convergence

Watch the experts edition panel discussion featuring ESG Principal Analyst John Grady and AlgoSec leaders as they explore: How security responsibility is converging across cloud and datacenter environments—and what that means for your team The top causes of cloud breaches—and how to stop them before they spread 5 proven ways to unify visibility, policy enforcement, and zero trust across hybrid multi-cloud networks How to automate security workflows without slowing down innovation Real-world insights on AI risks, agent sprawl, and tool fragmentation in a converged security world.

Inside Qubit Conference Prague 2025: Hacking Social Platforms and Securing AI

Qubit Conference Prague 2025 brought together some of the sharpest minds in cybersecurity—and Cato CTRL made sure to leave a mark. Not only did we share insights on AI-powered security, but we also marked a major milestone: the opening of our new R&D office in Prague. This expansion strengthens our global footprint and taps the best in the local engineering and development talent to help with the kinds of projects we present at Qubit.

Cato CTRL Threat Research: Investigation of RMM Tools Leveraged by Ransomware Gangs in Real-World Incidents

Remote Monitoring and Management (RMM) tools are essential for IT operations, but their powerful capabilities and trusted status within enterprise networks have also made them valuable to threat actors. In the second half of 2024 and first quarter of 2025, we uncovered a recurring pattern during a series of cyber forensic investigations and threat detections impacting two US-based organizations and one UK-based organization.

The Future of Cybersecurity: How SASE Security is Transforming Network Protection

For decades, enterprise networks resembled fortified castles: one or two drawbridges (MPLS links) funneled all traffic back to a central moat where hardware firewalls, proxy stacks, and IPS appliances examined every packet. Cloud computing, hybrid work, and an explosion of SaaS shattered that perimeter. Today, an employee might open a CRM record in Salesforce from a café, push source code to GitHub over home Wi-Fi, and join a Zoom meeting through a 5G hotspot-often in the same morning.