Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Connect:fun: New exploit campaign in the wild targets media company

In a new threat briefing, Forescout Research – Vedere Labs details an exploitation campaign targeting organizations running Fortinet’s FortiClient EMS which is vulnerable to CVE-2023-48788. We are designating this campaign Connect:fun because of the use of ScreenConnect and Powerfun as post-exploitation tools – our first-ever named campaign.

The Cato Socket Gets LTE: The Answer for Instant Sites and Instant Backup

Every year, Bonnaroo, the popular music and arts festival, takes over a 700-acre farm in the southern U.S. for four days. While the festival is known for its diverse lineup of music, it also offers a unique and immersive festival experience filled with art, comedy, cinema, and more.

Trainspotting: Lessons in Network Security and Critical National Infrastructure

Today, in the heart of London, I caught sight of a screen on platform four at Vauxhall train station. On it was displayed a busy illustration of the marvels of modern transportation: trains moving seamlessly across multiple lines; their positions, destinations, and tracks all displaying tightly orchestrated precision in real-time. It was a compelling depiction of the complexity of a public rail system on a small island–a tightly woven network where data integrity is paramount.

How a Network Digital Twin Helps Overcome One of the Most Significant IT Challenges: Technical Debt

Rodney Alto served 35 years as a senior executive in technology at the Central Intelligence Agency. He’s now a senior advisor for federal strategy and security at Forward Networks. What is one of largest challenges today in IT? It’s not AI, quantum computing, or even cyber—it’s technical debt.

Mastering Digital Forensics: Smart Methods for Investigative Success

As technology evolves, so do the methods and tools used by malicious actors, making it crucial for digital forensic analysts to stay ahead of the curve. This article explores smart strategies, methodologies, and digital forensics software that empower cybersecurity specialists to navigate complex digital environments and effectively uncover crucial evidence.

Blackhat NOC: Findings from Europe & thoughts for Asia 2024

How quickly a year passes. 2023 was Corelight’s first year participating in the Black Hat Network Operations Center (NOC). It was a tremendous opportunity and responsibility in which we collaborated with teams from Cisco, Palo Alto Networks, Arista, Lumen, and NetWitness to keep events in Asia, Europe, and the US safe and functional for all attendees. As we speak, our team is gearing up for a repeat for Black Hat Asia 2024 in Singapore.

Ensuring Cyber Security for Your Forex Trading

The foreign exchange market is full of ups and downs, making it exciting but risky. And it's not just the market swings you need to watch out for; cyber threats are a genuine concern, too. As technology gets smarter, so do the risks, but thankfully, the ways to protect ourselves are getting better as well.

How Cato Uses Large Language Models to Improve Data Loss Prevention

Cato Networks has recently released a new data loss prevention (DLP) capability, enabling customers to detect and block documents being transferred over the network, based on sensitive categories, such as tax forms, financial transactions, patent filings, medical records, job applications, and more. Many modern DLP solutions rely heavily on pattern-based matching to detect sensitive information. However, they don’t enable full control over sensitive data loss.

Forward Networks Receives Gold Award for Cloud Computing Security Solution at the 2024 Globee Awards for Cybersecurity as well as the GOVIE Award for Compliance Acceleration at the 2024 Government Security Awards by Security Today

Forward Networks won the prestigious Gold designation for Cloud Computing Security at the 2024 Globee Awards for Cybersecurity. This recognizes Forward Networks' commitment to transforming how SecOps, CloudOps, and NetOps teams operate by creating a single source of truth for engineers with actionable insights that empower them to regain control over their networks.

Outsmarting Cyber Threats: Etay Maor Unveils the Hacker's Playbook in the Cloud Era

In an era where cyber threats evolve as rapidly as the technology they target, understanding the mindset of those behind the attacks is crucial. This was the central theme of a speech given by Etay Maor, Senior Director of Security Strategy, of Cato Networks at the MSP EXPO 2024 Conference & Exposition in Fort Lauderdale, Florida. Titled, “SASE vs.