Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Malware

Cato CTRL Threat Actor Profile: Yashechka

To further raise awareness on threat actor activity in the dark web and hacking communities, today we are introducing the Cato CTRL Threat Actor Profile. This will be a blog series that profiles various threat actors and documents notable activity that we are observing. Our inaugural Cato CTRL Threat Actor Profile is on Yashechka.

How To Mitigate the Risk of Ransomware Attacks

You can mitigate the risk of ransomware attacks by regularly backing up your data, updating your device with the latest software, implementing least-privilege access, using a business password manager and educating employees about security awareness, among other things. Ransomware attacks occur when organizations are prevented from accessing files and data until they’ve paid a ransom to the cybercriminal who infected their devices with malware.

Advanced Android Malware Targets NFC Data for ATM Cashouts

A new strain of Android malware has emerged, targeting victims' card details and utilizing near-field communication (NFC) technology to facilitate unauthorized ATM withdrawals. This sophisticated crimeware, active since March 2024, has already impacted customers of three major Czech banks.

Common Ransomware Attack Types

When it comes to cybersecurity, ransomware is probably one of the first threats you think of. It seems like it’s everywhere — and it is. Ransomware is one of the most notorious cyber threats affecting individuals, businesses, and organizations globally. The frequency and impact of these attacks have surged in recent years, making it crucial to understand their nature and how to protect against them.

Secure Databases at the Point of Data: Rubrik Support for Oracle Databases on Windows Is Now Available

In today's data-driven world, protecting critical business information is paramount. We're excited to announce that Rubrik support for Oracle Databases on Windows is now available. This added support enables customers to bring Rubrik Security Cloud to even more of their mission-critical Oracle environments, providing a comprehensive, efficient, and reliable data protection solution for enterprises of all sizes.

Operationalizing Data Security Posture Management

Operationalizing any new security platform begins with the process of integrating the platform with an organization’s existing infrastructure and workflows. To get the most value out of the system we need to offer an easy path to adoption if we want to crossover from theoretical security concepts into practical, day-to-day operations that protect against cyber threats. Technology change is hard, but changing the way people work is even harder.