Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

WebPromptTrap - New Indirect Prompt Injection Vulnerability in BrowserOS

Cato researchers have discovered a new indirect prompt injection exploit pattern workflow in BrowserOS (an open-source agentic AI browser). We named it “WebPromptTrap” because the prompt originates from untrusted web content and it traps users into approving an authorization step through a trusted-looking AI summary.

Sophos Firewall ranked the #1 overall firewall solution in G2's Spring 2026 reports

Sophos Firewall ranked the overall firewall solution in G2’s Spring 2026 reports Why organizations are choosing Sophos Firewall to reduce exposure and strengthen resilience When organizations evaluate security products, they want real‑world proof of reliability, protection, and ease of management.

Corelight Agentic Triage demo

Corelight is excited to introduce Agentic Triage! In this demo, you can see how Agentic Triage helps SOC analysts filter through alerts and respond quickly to active threats. We combine generative AI with our industry leading log framework to identify the detections and cases that truly matter. This video shows how you can use Agentic Triage to quickly perform deep dives into open detections and make confident decisions to secure your network.

Corelight Agentic Triage overview

Corelight is excited to introduce Agentic Triage! In this demo, you can see how Agentic Triage helps SOC analysts filter through alerts and respond quickly to active threats. We combine generative AI with our industry leading log framework to identify the detections and cases that truly matter. This video shows how you can use Agentic Triage to quickly perform deep dives into open detections and make confident decisions to secure your network.

When Quantum Turns Encryption Into a Time Problem

If your encrypted traffic was captured today, would it still be private in ten years? That question changes the conversation. Leaders are used to asking, “Is it encrypted?” Now they are asking, “How long does it stay confidential?” That is where post quantum cryptography, or PQC, comes in. Its role is to strengthen the foundations of a secure connection by improving how trust is established before any data is exchanged. Today’s encryption still works.

Where Cato Sits in the AI Economy

Every major technological shift reshapes the landscape, creating both winners and losers. AI will be no different. The key question is which companies are positioned to capture the value it generates, and which ones may fall behind as it unfolds. If you look at previous technology shifts, the winners were not always the companies building the most visible products. They were often the ones that enabled the shift to happen in the first place, or those that benefited from the structural changes it created.

Segmentation Built for the Hybrid Reality

Traditional, IP‑based segmentation can’t keep up with today’s hybrid networks. In this video, learn why visibility, device identity, and risk context are essential to segmenting modern IT, OT, and IoT environments — and how Forescout is redefining segmentation for the way enterprises actually operate.

What to Know About Security Camera Systems and Cyber Risk

Modern office buildings rely on networked cameras to keep people and property safe. Most people see a camera and feel a sense of protection. They do not often think about the wires or the data behind the lens. These devices are small computers that live on your main business network. They send video signals through cables hidden in the walls and ceilings. If these paths are not secure, the whole system can fail.

Growing Pains: Headaches from Network M&A

Growth through acquisition can accelerate market reach and revenue. But it often leaves IT teams managing a fragmented network environment. When your organization is adding two new locations per month, each with its own carrier contracts, circuit types, and support agreements, the result is a patchwork infrastructure that’s expensive to maintain and difficult to secure. For IT professionals tasked with keeping systems stable while supporting aggressive expansion, this creates a critical challenge.

Fueling Cisco XDR with Corelight high-fidelity network evidence

From hunting threats to solving complex problems to coding on a couch, adventures in the Black Hat NOC (Network Operations Center) are always interesting. Over the last few months and several shows, I’ve had the privilege of working with one of the other NOC partners, Cisco, to design and test our first integration between Corelight Investigator and Cisco XDR.