Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Detecting Ransomware on Networks at Scale Using Traffic Analysis

Ransomware attacks are still causing serious financial and reputational damage to organizations. In May 2024, they made up 32% of all reported cyber incidents, and 92% of industries saw them as a major threat. These attacks lock important data and ask organizations for payment to regain access. Even after paying, attackers might have already gone through the whole system and left loopholes for future attacks. In some cases, ransomware hides in a network for a long time before being noticed.

Cato CTRL Threat Research: Uncovering Nytheon AI - A New Platform of Uncensored LLMs

With the introduction of WormGPT in 2023, threat actors have been using uncensored large language models (LLMs) for malicious activities. Following the shutdown of WormGPT in the same year, numerous alternatives have emerged—including BlackHatGPT, FraudGPT, and GhostGPT, among others—primarily accessible through Telegram channels.

Firewalls and VPNs in the Line of Fire: How Exploits Are Evolving

Over the past year, cybercriminal activity has shifted toward exploiting vulnerabilities found in company perimeters and infrastructure systems. Attacks are also being carried out within shorter and shorter timeframes. According to data from Google Threat Intelligence Group (GTIG) in 2024, 44% of zero-day attacks affected enterprise-focused technologies, compared to 37% in 2023.

Fortune Media and Great Place To Work Name Forward Networks to 2025 Fortune Best Workplaces in the Bay Area

Great Place To Work® and Fortune magazine have honored Forward Networks as one of this year's Best Workplaces in the Bay Area. This marks back-to-back years of Forward Networks being named to this prestigious list, coming in at No. 16 in 2025. Earning a spot means that Forward Networks has surpassed rigorous benchmarks, establishing itself as one of the best workplaces in the San Francisco Bay region.

Meet Cato's MCP Server: A Smarter Way to Integrate AI Into Your IT & Security Processes

Sometimes preparing dinner can be a complicated task. You’re juggling a stir-fry, boiling pasta, prepping a salad, and all you want is to say “Chop the onions” and have it done. No switching between tasks, no looking up steps. Just state the intent, and it’s executed. We wanted that same level of simplicity when interacting with our environment, including sites, users, topology, and real-time data. That led us to build Cato’s Model Context Protocol (MCP) Server.

Is Your Rented Server Safe Enough?

We get it-you've rented a server. Whether it's for your business, your app, your game, or just that brilliant startup idea you're nurturing, renting a server feels like leveling up. It's exciting, empowering... and terrifying. Because the moment that server is online, it's visible to the entire internet. Including the bad guys. Hackers, bots, DDoS armies, and other digital troublemakers don't care that it's "just a test project." If it's online, it's fair game. So, how do you protect it?
Featured Post

Navigating Operational Resilience Regulation in Cloud Computing

The rate of adoption for cloud computing has grown steadily across many industries, driven by the need for flexibility, innovation and cost efficiency. One of the key verticals that has fully embraced cloud technology is the financial services sector. Cloud is particularly suited to this industry as it allows for more efficient storage, faster processing of large amounts of data, and consolidation of records which gives firms the ability to accurately analyse data.

Protect AI-power apps with Cloudflare Firewall for AI

As organizations refactor applications and adopt AI and Large Language Models (LLMs) to power new applications and enhance existing services, a new class of security vulnerabilities has emerged. Traditional web application firewalls (WAFs) are only partially equipped to defend against threats unique to AI. In this video, we provide an overview of Cloudflare's Firewall for AI product, how it works, and how you can use it to protect AI models and safeguard user interactions with those models.