Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cato CTRL Threat Research: Analyzing LAMEHUG - First Known LLM-Powered Malware with Links to APT28 (Fancy Bear)

On July 17, 2025, Ukraine’s Computer Emergency Response Team (CERT-UA) publicly reported LAMEHUG, which is being documented as the first known malware that integrates large language model (LLM) capabilities directly into its attack methodology.

Inside Qubit Conference Prague 2025: Hacking Social Platforms and Securing AI

Qubit Conference Prague 2025 brought together some of the sharpest minds in cybersecurity—and Cato CTRL made sure to leave a mark. Not only did we share insights on AI-powered security, but we also marked a major milestone: the opening of our new R&D office in Prague. This expansion strengthens our global footprint and taps the best in the local engineering and development talent to help with the kinds of projects we present at Qubit.

Cato CTRL Threat Research: Investigation of RMM Tools Leveraged by Ransomware Gangs in Real-World Incidents

Remote Monitoring and Management (RMM) tools are essential for IT operations, but their powerful capabilities and trusted status within enterprise networks have also made them valuable to threat actors. In the second half of 2024 and first quarter of 2025, we uncovered a recurring pattern during a series of cyber forensic investigations and threat detections impacting two US-based organizations and one UK-based organization.

Cato CTRL Threat Actor Profile: IntelBroker

In June 2025, FBI New York and the U.S. Attorney’s Office for the Southern District of New York announced charges against “IntelBroker,” the online persona of 25-year-old British national Kai Logan West. IntelBroker operated one of the most sophisticated data brokerage operations documented in the recent history of cybercrime.

A Leader Once Again: Cato Networks Recognized in 2025 Gartner Magic Quadrant for SASE Platforms

For the second consecutive year, Cato Networks has been recognized as a Leader in the 2025 Gartner Magic Quadrant for SASE Platforms. We believe this recognition validates our relentless commitment to innovation, excellence, and above all, our customers’ success. In a fiercely competitive landscape, we know that standing out means building SASE the right way, from the ground up, designed specifically for the needs of modern enterprises.

Shadow AI Is Everywhere. Cato Puts You Back in Control

Generative AI boosts productivity—but also introduces serious risks: data leakage, compliance violations, and flawed outputs. Most enterprises lack visibility into how GenAI tools are being used across their environment. Cato changes that. In this video, we introduce Cato’s GenAI Security Controls—a native part of the Cato SASE Cloud Platform. No extra consoles. No new licenses. Just immediate visibility and control.

Cato's Unique ZTNA Broker Architecture - A Difference That Matters!

Zero Trust Network Access (ZTNA) has rapidly become a foundational security strategy for organizations modernizing their IT infrastructure. The increasing distribution of users, devices, and applications makes traditional security measures inadequate. Several solutions offer cloud-based brokers to implement ZTNA, but it’s crucial to understand that these solutions are not created equal. Let’s explore why Cato Networks’ cloud-based ZTNA solution distinctly stands apart.

Cato CTRL Threat Research: Overview of BloodHound and Associated Collectors Including ShadowHound, SharpHound, and SoapHound

Think back to when you were a kid, eyeing a cookie jar on the top shelf. Getting to it wasn’t just about reaching; it was about strategy. You had to avoid making noise, pick the sturdiest route, and time your move perfectly to avoid getting caught. Imagine having a team of expert scouts feeding you all the correct information: where the dangers are, which surfaces can support you, and the best way to grab that prize unnoticed. That’s exactly what BloodHound does.

Unlock the Retail Edge: How Partners Can Lead with Cato

To compete in today’s retail landscape, IT must support new growth strategies while delivering seamless, secure customer experiences. This means enabling rapid store rollouts, digitizing in-store experiences, and connecting cloud-based systems across every location. Customers expect faster, more connected, and more secure interactions at every touchpoint.