Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Making Security Data-Aware with New Integration from Cato Networks and Cyera

Today, Cato Networks announced an integration of Cato XOps with the Cyera AI-native Data Security Platform Management (DSPM). The integration brings Cyera’s data security telemetry directly into Cato XOps, giving security teams visibility into the sensitivity and exposure of data involved in security events. In today’s distributed environments, data lives across the cloud, SaaS, endpoint, and network.

Frontier AI and the Demise of Hardware Security

The cybersecurity industry has long relied on a simple idea: find vulnerabilities, patch them, and measure success by how fast you close the gap. “Time-to-patch” became a badge of honor. That model no longer holds. The rise of Mythos-class Frontier AI Models introduces a different kind of threat. AI-driven, agentic attacks operate continuously, discover weaknesses automatically, and execute at a scale no human team can match.

Cato CTRL Threat Research: Suspected China-Linked Threat Actor Targets Global Manufacturer with Undocumented TencShell Malware

In April 2026, Cato CTRL identified and blocked an attempted intrusion against a global manufacturing customer involving TencShell, a previously undocumented, Go-based implant derived from the open-source Rshell C2 framework. The activity appeared in traffic associated with a third-party user connected to the customer environment.

Audit Ready by Design: Continuous Compliance Posture You Can Prove

Think of your environment like a medical clinic. Patients with new “symptoms” show up every day, such as an overly permissive firewall rule or a missed TLS inspection policy. A good doctor triages the most severe case and prescribes the right fix before the “symptoms” escalate.

Beyond Patch SLAs: Continuous Protection in the Frontier AI Era

Frontier AI is changing the economics of cybersecurity. Advanced models can accelerate vulnerability research, exploit-path analysis, attack planning, and disclosure workflows, making vulnerability discovery more continuous, automated, and AI-driven. This raises the bar not only for enterprises that need faster protection, but also for cybersecurity vendors that must adapt secure development, production security, runtime validation, incident response, and AI-assisted workflows to keep pace.

Threat Brief: CVE-2026-41940: Critical cPanel & WHM Authentication Bypass Actively Exploited in the Wild

CVE-2026-41940 is a critical authentication bypass vulnerability in cPanel & WHM, including DNSOnly, and WP Squared. The issue affects cPanel software versions after 11.40 and can allow an unauthenticated remote attacker to gain unauthorized access to exposed hosting control panels. cPanel released patched versions and published official remediation and detection guidance.

Cato Joins OpenAI's Trusted Access for Cyber (TAC) to Advance AI-Driven Defense

Over a decade ago, Cato Networks helped shift cybersecurity to a new frontier: a converged, cloud-native platform that combines security and networking. As a long-time security researcher, the Cato platform was a radical change, providing researchers with the rich context and end-to-end visibility we needed to identify threats faster and deliver accurate protections.

Cato CTRL Threat Research: New Vulnerabilities in NVIDIA NeMo and Meta PyTorch Enable Full System Compromise

Cato CTRL has discovered high-severity vulnerabilities in NVIDIA NeMo (CVE-2025-33236 with a CVSS score of 7.8) and Meta PyTorch that turns AI model files into remote code execution (RCE) vectors. The NeMo vulnerability allows RCE by importing a malicious AI model. The NeMo framework silently executes threat actor-controlled code with no warning.

How AKRF Orchestrated a Network Shift, Optimizing IT to Drive Expansion

The consulting firm wanted a secure, reliable network to better manage resources for modern applications so employees could work more effectively. With the Cato SASE Platform, they got that and much more: centralized visibility, control, and the foundation for secure growth.

Darling Ingredients Consolidates Vendors, Increases Agility, and Saves $750K+ Annually with Cato

As Darling Ingredients expanded, so did the opportunity to modernize how its global operations are connected and secured. With the Cato SASE Platform, the Darling Ingredients’ IT team replaced complexity with consistency, reduced costs, and gained the agility to support smarter growth, elevating IT as a strategic partner to the business.