Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing Cato's API Assistant: Your New Copilot for GraphQL

Imagine you just got a new car with a feature that automatically adjusts the air conditioning based on live weather forecasts. To activate it, you need to connect the car to an external weather service. You could take it to the garage, pay someone to configure it, and wait for the job to be done. Or, you could use a built-in assistant that asks you two simple questions and shows you how to set everything up in minutes. That’s the idea behind Cato’s new API Assistant.

Cato CTRL Threat Research: Oyster Malware Loader Targets Tech-Savvy Users with Smarter Techniques During Summer Malvertising Campaign

Summertime in the U.S., Europe, and many other regions typically falls between June and September. Tech teams, admins, and even their bosses take vacations. Inboxes slow down, and production systems finally get a breather. But for the threat actors behind Oyster, while others were reaching for sunscreen or enjoying real sea fishing, they launched their own phishing campaign using something far more effective than email and sharpened their hook.

Who Said It Challenge - Cybersecurity Edition with Cato's Chief Security Strategist

Think you can tell cybersecurity heavyweights from sci-fi legends? @Etay Maor, Chief Security Strategist at Cato, thought so too, until a quote left him speechless (and slightly heartbroken). Watch on and test your own cyber + pop culture instincts.

One Click to Zero Trust: How Cato's Agentless Microsegmentation Blocks Lateral Movement and Simplifies Network Security

One click on a malicious email. One compromised device. That’s often all it takes for malware or ransomware to spread across an entire network in minutes. In other cases, attackers move silently for months before striking. Cato’s agentless microsegmentation stops lateral movement at its source, isolating each device and preventing threats from spreading before they cause real damage.

Designing the Future of Agentic AI: Cato Engineering Details a New Practical, Secure, and Scalable MCP Server Framework

Some of you may remember the early days of security, when setting up a firewall or antivirus felt like enough. It was simple and gave us a sense of control. But over time, we learned that security is a moving target. What once felt sufficient quickly became just the starting point. In today’s agentic AI era, many treat their Model Context Protocol (MCP) setups the same way. If it’s running and returning results, it feels good enough. But the AI landscape is evolving rapidly.

Security and Performance Issues, Handled: The Efficiency Power of Cato XOps

You’re an IT professional whose teams manage network and security. They face millions of alerts each day, from threat detections to access anomalies and from connection failures to latency spikes. Your costs are high: it’s been hard to scale your team to cope with the growing volume of events. But the stakes are also high. Miss the wrong operational alert and your network team gets swamped with tickets. Miss the wrong security alert and your whole business is exposed.

Cato CTRL Threat Research: New Streamlit Vulnerability Enables Cloud Account Takeover Attack and Stock Market Dashboard Tampering

Imagine financial analysts watching stock prices suddenly drop. Dashboards show misaligned data, market confidence disappears, and trading screens across the NASDAQ turn red. But this time, the disruption isn’t caused by politics or economic shifts. It starts with a cyberattack. We reveal how a simple and overlooked flaw in Streamlit’s file upload feature, part of a widely used open-source framework for building stock market dashboards, could be used to cause this kind of financial chaos.

ZTNA Alone Won't Win the Zero Trust Race. Here's Why.

In the race to secure modern enterprises, Zero Trust Network Access (ZTNA) is gaining speed, and has become the default remote access solution for many enterprises. But while ZTNA is a fabulous on-ramp to Zero Trust and a broader security strategy, it’s not enough to secure the win on its own. Operationalizing Zero Trust requires takes than just access control. It requires a security platform play: convergence, continuous risk evaluation, and visibility across every edge.

Cato CTRL Threat Brief: "ToolShell" Exploit Targeting Microsoft SharePoint Vulnerabilities

On July 22, 2025, Microsoft published an overview of a series of critical vulnerabilities affecting Microsoft SharePoint Server (CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE-2025-53771). These vulnerabilities opened a dangerous window for threat actors to gain access to internal resources, execute code remotely, and take over SharePoint deployments.