Cato CTRL (Cyber Threats Research Lab) has released its Q2 2024 Cato CTRL SASE Threat Report, which summarizes findings from Cato CTRL’s analysis of 1.38 trillion network flows across more than 2,500 customers globally between April and June 2024.
What’s Inside the Report
- Threat intelligence trends: Notable activities within hacking communities and the dark web.
- Enterprise security trends: A breakdown of the top 10 spoofed brands, the top 10 AI applications used, and the top 10 anonymizer applications used.
- Network security trends: Key stats on Suspicious Activity Monitoring (SAM), secure vs. insecure protocols and mitigated vulnerabilities.
- Security best practices: Recommendations to enhance your security posture.
Key Findings
- Putting the spotlight on a notorious cybercriminal: IntelBroker is a highly active threat actor selling data and source code from major brands, including tech companies like AMD, Apple, Facebook and Microsoft.
- The rise of cybersquatting: Amazon is the top spoofed brand.
- Old vulnerabilities persist: Log4j remains a popular vulnerability that threat actors attempt to exploit.
- Strategic recommendations: Receive guidance such as implementing continuous threat intelligence monitoring, educating yourself on the perils of cybersquatting, and prioritizing the patching of highly exploited vulnerabilities.
About Cato CTRL
- Cato CTRL is the cyber threat intelligence (CTI) team at Cato Networks.
- Cato CTRL protects organizations by collecting, analyzing and reporting on external and internal threats, utilizing the data lake underlying the Cato SASE Cloud Platform.