Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cato Networks

The 3CX Supply Chain Attack - Exploiting an Ancient Vulnerability

Supply chain attacks are one of the top concerns for any organization as they exploit (no pun intended) the inherited trust between organizations. Recent examples of similar attacks include SolarWinds and Kaseya. On March 29th, a new supply chain attack was identified targeting 3CX, a VoIP IPXS developer, with North Korean nation-state actors as the likely perpetrators.

What is SASE? #shorts

Cato Networks provides the world’s first converged SD-WAN and network security cloud platform built for digital business transformation. Cato connects all data centers, branches, mobile users, and cloud resources into a secure, global network uniquely powered by the scalability, self-service, and agility of the cloud. Cato empowers you to connect, secure, and run the network yourself, and supports you with expert-managed services if you need them.

The Evolution of Qakbot: How Cato Networks Adapts to the Latest Threats

The world of cybersecurity is a never-ending battle, with malicious actors constantly devising new ways to exploit vulnerabilities and infiltrate networks. One such threat, causing headaches for security teams for over a decade, is the Qakbot Trojan, also known as Qbot. Qakbot has been used in malicious campaigns since 2007, and despite many attempts to stamp it out, continues to evolve and adapt in an attempt to evade detection.

CyberTalk with Bill and Robin: 22nd March 2023

1.Hold your horses: Ferrari extorted by RansomEXX The italian sportscar manufacturer carmaker was contacted by a threat actor (RansomEXX) with a demand related to certain client contact details. Upon receipt of the ransom demand, Ferrari immediately started an investigation, however extortion is underway and 7GB of sensitive data has been allegedly leaked. How could this have been prevented?

CyberTalk with Bill and Robin - 29th March 2023

The US Military Cyber Professional Association urged lawmakers this week to establish a U.S Cyber Force in this year's annual defence policy bill. It has been alleged that the current approach to Cybersecurity across the current 6 military branches has been divided, inconsistent, and inefficient, and that a dedicated security branch is needed. The Government is converging, why should you?

Burnout: how to prevent, heal and deal with it

Burnout in the workplace is a growing concern as more and more employees are feeling overwhelmed and exhausted by the demands of their jobs. Burnout can manifest in a variety of ways, including physical and emotional fatigue, lack of motivation, and difficulty concentrating. It can also lead to decreased productivity, increased absenteeism, and a higher risk of mental health issues, in addition to high costs to the companies these employees work for. Burnout is more common in IT professionals due to a combination of factors, such as a lack of work-life balance, lack of recognition, inadequate compensation, and lack of autonomy.

Cato Protects Against CVE-2023-23397 Exploits

A new critical vulnerability impacting Microsoft Outlook (CVE-2023-23397) was recently published by Microsoft. The CVE is particularly concerning as no user involvement is required by the exploit. Once a user receives a malicious calendar invite, the attacker can gain a user’s Active Directory credentials. Microsoft has released a security update that can be found here. Cato Research strongly encourages updating all relevant systems as proof-of-concept exploits have already appeared online.