Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cato CTRL Threat Research: WormGPT Variants Powered by Grok and Mixtral

When large language models (LLMs) became popular following OpenAI’s public release of ChatGPT in November 2022, threat actors understood the potential of such systems and how they can be used in their malicious operations. However, the main challenge that threat actors encountered a couple of years ago is that the LLMs were censored and didn’t allow the creation of malicious content. Enter WormGPT.

AWS KMS Embraces the Quantum Era with ML-DSA Digital Signature Support

As quantum computing creeps closer, the cryptographic mechanisms on which today’s digital world relies are becoming more and more fragile. In a prescient move, AWS Key Management Service (KMS) now supports ML-DSA, one of the first post-quantum digital signatures, which has become a standard under FIPS 203. This is an important step in AWS’s broader efforts to prepare customers for the post-quantum secure future.

14 WhatsApp Scams & How to Avoid Them

WhatsApp has reached over 2 billion users worldwide, making it one of the most popular messaging platforms available for your phone, tablet, and desktop. It’s a great way to connect with friends, send photos, create group chats, and host video calls. It also gives scammers a huge field to play with when attempting to scam people online. To help you protect your data, finances, and accounts, we will explain the 14 most common WhatsApp scams cybercriminals use and how to prevent them.

SIEM Essentials for Security Operations

For many Security Operations Center (SOC) teams, every day feels like a balancing act just shy of burnout. The alerts don’t stop. The tooling gets in the way more than it helps. And analysts—the people at the heart of security operations—are left trying to untangle signals in a sea of noise, pressure, and constant escalation. This isn’t just a tooling issue. It’s a deeper misalignment: the gap between what SIEM was supposed to be and what security teams actually need.

The Complete Guide to Attribute-Based Access Control (ABAC)

ABAC is an access control paradigm where access rights are granted through the use of attributes associated with: Access decisions are made using policy rules that evaluate these attributes. For example, a doctor can access patient records only if they are on duty and the patient is in their department.

5 Overlooked Types of Endpoint Security You're Probably Missing

Most posts about types of endpoint security mention antivirus software, firewalls, or maybe EDR/XDR. And while those security technologies are important, they’re not enough. Cyberattacks have evolved. Today’s cyber threats target laptops, smartphones, and even IoT devices. Ransomware moves laterally. Zero-day exploits bypass signature-based defenses. Phishing attacks hit the end-user, not just the firewall.

Beyond Compliance: Using ASPM to Align Application Security with Business Objectives

Are you confident that your application security testing (AST) efforts are truly protecting your business, or are they just ticking boxes for compliance? These days, simply meeting regulatory requirements isn’t enough. Security teams face mounting pressure from alert overload, fragmented tools, and an ever-growing backlog of vulnerabilities. Meanwhile, executives demand clear evidence that security investments are driving real business value. So how can security leaders bridge this gap?

Planning for a Post-quantum World, Now!

One of the primary concerns occupying future-gazers within the technology industry is the impact that quantum advances will have upon established encryption methods. Quantum computing is advancing at pace, and alongside the enthusiasm for what that will enable is a practical concern for the way quantum processing might render some of today’s security approaches ineffective.

2025 Gartner SRM Summit: From Gatekeeper to Enabler. How Security Leaders Can Embrace AI Agents with Confidence

The 2025 Gartner Security & Risk Management Summit was a wake-up call, and an opportunity, for anyone responsible for securing the future of AI. With over 1,700 AI use cases now reported across federal agencies and enterprise adoption growing at a breakneck pace, the message was clear: AI is no longer on the horizon. It’s here, it’s active, and it needs securing.