Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SIP Trunking Security in 2026: What Enterprises Must Know Before Their Next Breach

Telecom fraud exceeded an estimated $41.82 billion in losses in 2025 - and a substantial share of that exposure runs directly through SIP trunks. The SIP trunking market itself reached $73.14 billion that same year, and is projected to more than double to $157.91 billion by 2030, according to Mordor Intelligence. That collision of rapid adoption and surging fraud is not a coincidence. Enterprises are migrating voice infrastructure to IP-based systems faster than security teams are adapting their threat models to cover them. In 2026, SIP trunking is business-critical infrastructure.

Cato CTRL Threat Research: Vishing and Microsoft Teams Used to Deliver PhantomBackdoor

Cato CTRL has discovered a q-based delivery technique used against an Italy-based consumer services company associated with PhantomBackdoor, a multi-stage WebSocket-based backdoor previously reported in a Ukraine-focused spear phishing operation by SentinelOne. In SentinelOne’s earlier reporting, initial access relied on phishing lures and a ClickFix-style flow that triggered a staged PowerShell and ended with a WebSocket backdoor.

From alerts to entities: Transforming the SOC with Corelight Agentic Triage

The cybersecurity landscape has fundamentally shifted in the last several years. Adversaries are no longer just using AI to draft phishing emails; they're deploying autonomous AI agents capable of executing end-to-end attack chains, from initial reconnaissance through lateral movement and data exfiltration. Anthropic's1 analysis of recent incidents indicates a rapid acceleration in attacker adoption of agentic workflows, dramatically shortening the time between initial access and impact.

Meet the Industry's First GPU-Powered SASE Platform with Native AI Security

AI has moved from experimentation to a strategic enterprise imperative. It’s no longer about whether organizations will adopt AI, but whether their security architecture can govern it at the speed and scale at which it is being embedded into the business. This is not a future concern. It is today’s operational mandate to: Securing AI is not limited to software applications and agents.

How to Scale Application Traffic Automatically with A10 FlexPool

How to Scale Application Traffic Automatically with A10 FlexPool Priyanka Mullan, Senior Product Marketing Manager at A10 Networks, explains how FlexPool revolutionizes application delivery by dynamically allocating resources based on real-time user demand. Whether you are managing a sudden traffic surge from a major online event or balancing workloads across a hybrid cloud environment, FlexPool ensures your infrastructure scales automatically, without manual intervention. Learn how to maintain peak application performance while significantly reducing operational costs.

Why geopolitical tensions should raise cyber awareness

When geopolitical tensions rise, cybersecurity quickly becomes part of the public conversation. Government agencies issue warnings. Security teams increase monitoring. Headlines start asking which organizations could become targets if cyber operations escalate alongside physical conflict. But geopolitical conflict does not suddenly create cyber risk. What it does increase is the likelihood that existing weaknesses will be tested and pre-existing risks could be exposed.

Code Review That Learns: Inside Cato R&D's Self-Evolving PR Review Agent

Agentic AI promises to improve work processes in all domains and industries. R&D is no different. Recently, Cato R&D built an internal self-evolving pull request (PR) review agent that keeps reviewers in flow by commenting only on high-impact, high-confidence issues, validating every change against its spec from the PR and Jira, and learning continuously from developer feedback through long-term, episodic memory. What were the results?

Cato CTRL Threat Brief: Middle East Escalation and Summary of Notable Iranian-Linked CVEs

On February 28, 2026, Israel and the United States launched a joint attack against Iran. In retaliation, Iran launched its own attacks against Israel and US-allied countries and bases in the region. The escalation in the Middle East is ongoing. Cato CTRL is currently monitoring the threat landscape in the region.

When the M&A Deal Closes, Is Your Architecture Accelerating Time to Value?

Imagine two talented orchestras playing together, but without a conductor or a single score. You get noise, not music. M&A can be like that. The value lies in having every musician on the same page. Traditional networking slows M&A execution. Cato delivers a cloud-native foundation that securely connects the new organization from day one, aligns policies and workflows under a single framework, and helps leadership realize value faster.

DDI Central 6.1: Enhanced IPAM visibility, root hint templates, trusted feeds in threat intelligence, and more

Previously, DDI Central version 6.0 introduced several enhancements designed to elevate the administrative experience, including streamlined importing of multiple servers in Windows environments, granular control over network resources through hierarchical roles, and a more in-depth view of network clusters. Now, DDI Central version 6.1 delivers broader and more comprehensive visibility into IP Address Management, featuring enhanced segmentation and multiple viewing options.