Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Endpoint Dilemma: Why Your Critical Systems Are More Vulnerable Than You Think

In today’s connected OT, ICS and CPS world, critical infrastructure organizations have a need to extend remote access to employees, 3rd party contractors, and OEMs. But in the rush to support remote operations, many critical infrastructure operators have exposed their critical systems to a silent but severe risk: the user endpoint.

6 Key capabilities needed for managing Active Directory that reduce risk and offer IT teams an edge

Identity and access management (IAM) is about enabling secure, scalable and efficient operations across increasingly complex environments. The right IAM solution doesn’t just support IT, it actively reduces friction, tightens security and adapts to an organization’s environment. Better outcomes happen with solutions that align with organizational needs and don’t demand numerous workarounds.

Why we moved our ECS services from Fargate to EC2

At Tines, we rely heavily on AWS Elastic Container Service (ECS) to power our workflow automation platform. For a couple of years, we used Fargate as our default compute layer – offering simplicity and removing the need to manage underlying hosts. However, as we scaled, we started hitting the edges of what Fargate could reliably offer. This is the story of why we migrated our backend services to an EC2-backed ECS Capacity Provider and what we learned along the way.

Cato CTRL Threat Research: WormGPT Variants Powered by Grok and Mixtral

When large language models (LLMs) became popular following OpenAI’s public release of ChatGPT in November 2022, threat actors understood the potential of such systems and how they can be used in their malicious operations. However, the main challenge that threat actors encountered a couple of years ago is that the LLMs were censored and didn’t allow the creation of malicious content. Enter WormGPT.

AWS KMS Embraces the Quantum Era with ML-DSA Digital Signature Support

As quantum computing creeps closer, the cryptographic mechanisms on which today’s digital world relies are becoming more and more fragile. In a prescient move, AWS Key Management Service (KMS) now supports ML-DSA, one of the first post-quantum digital signatures, which has become a standard under FIPS 203. This is an important step in AWS’s broader efforts to prepare customers for the post-quantum secure future.

14 WhatsApp Scams & How to Avoid Them

WhatsApp has reached over 2 billion users worldwide, making it one of the most popular messaging platforms available for your phone, tablet, and desktop. It’s a great way to connect with friends, send photos, create group chats, and host video calls. It also gives scammers a huge field to play with when attempting to scam people online. To help you protect your data, finances, and accounts, we will explain the 14 most common WhatsApp scams cybercriminals use and how to prevent them.

SIEM Essentials for Security Operations

For many Security Operations Center (SOC) teams, every day feels like a balancing act just shy of burnout. The alerts don’t stop. The tooling gets in the way more than it helps. And analysts—the people at the heart of security operations—are left trying to untangle signals in a sea of noise, pressure, and constant escalation. This isn’t just a tooling issue. It’s a deeper misalignment: the gap between what SIEM was supposed to be and what security teams actually need.

The Complete Guide to Attribute-Based Access Control (ABAC)

ABAC is an access control paradigm where access rights are granted through the use of attributes associated with: Access decisions are made using policy rules that evaluate these attributes. For example, a doctor can access patient records only if they are on duty and the patient is in their department.