article thumbnail

Cato CTRL Threat Research: Unmasking Hellcat – Not Your Average Ransomware Gang

CATO Networks

With the Cato SASE Cloud Platform , organizations can leverage the security stack to kill the ransomware attack chain as quickly as possible. Double extortion to exfiltrate data before encrypting target systems. This blog provides a summary of notable activity by Hellcat in November and December 2024.

Energy 110
article thumbnail

Revolutionizing TLS Inspection: How Cato Networks Is Transforming Encrypted Traffic Security 

CATO Networks

Introduction In todays digital environment, encrypted traffic has become the norm, with over 90% of web communications now utilizing encryption. While this secures data in transit, it has become a blind spot for enterprises, enabling attackers to hide malware within encrypted channels.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why SASE Makes Zero Trust Work   

CATO Networks

This blog post looks at why zero trust alone isnt enough, headaches in deploying it, andbecause we never leave a problem unsolvedhow to fix it with SASE (Secure Access Service Edge). link] SASE delivers better zero trust outcomes Deploying zero trust within a SASE architecture extends its efficacy.

SASE 51
article thumbnail

Cato CTRL™ Threat Research: Exploiting Model Context Protocol (MCP) – Demonstrating Risks and Mitigating GenAI Threats 

CATO Networks

When the file is triggered, the attacker manipulates the MCP server to encrypt the victims files. The hidden prompt is triggered, manipulating the MCP server on the victims device and encrypting their files. Sonnet with an MCP server installed. Sonnet where the MCP server is installed.

article thumbnail

Deploying Cato SASE, Step by Step

CATO Networks

Deploying the Cato SASE solution can be both simple and quick if you follow this checklist. The collaboration of this team will be crucial for the successful implementation of your Cato SASE platform. The key deliverable from your planning meetings will be a formal SASE deployment plan, which will become the roadmap for your project.

SASE 52
article thumbnail

Traditional Firewalls Can’t Keep Up with the Growth of Encrypted Traffic

CATO Networks

A growing percentage of Internet traffic is protected by encryption. According to Google , approximately 95% of web browsing uses the encrypted HTTPS protocol. This trend toward traffic encryption has been driven by a few different factors. The move toward data encryption is a mixed blessing for cybersecurity.

article thumbnail

Highlights from Q3 2024 Cato CTRL SASE Threat Report 

CATO Networks

Introduction Today, we published the Q3 2024 Cato CTRL SASE Threat Report , which summarizes findings from Cato CTRLs analysis of 1.46 Q3 2024 Cato CTRL SASE Threat Report | Download the report TLS attack attempts reveal TLS inspection not utilized enough TLS inspection allows organizations to decrypt, inspect and re-encrypt traffic.

SASE 52