SASE Threat Research Reports

The Cato Networks Research Report highlights cyber threats and trends based on almost 200 billion network flows that passed through Cato Cloud.

SASE Quarterly Threat Research Reports

Cato Networks SASE Threat Research Report for Q1-2022
  • Reputation-based attacks (fueled by Phishing and malware) more than doubled in Q1 of 2022
  • Log4j continues to dominate in exploitation attempts
  • New for 2022 reports – MITRE attacks techniques stats
  • TOP MITRE attack techniques observed on networks include data exfiltration attempts and application layer protocol usage
Cato Networks SASE Threat Research Report for Q4-2021
  • Log4j was had the most exploit attempts in Q4 (by far)
  • While there was a decline in the number of malware threats, threats from low reputation destinations is on the rise
  • A total of over 1 trillion network flows were analyzed in 2021
  • Exploit attempts of PHP vulnerabilities consistently remained in the Top 5 exploit attempts throughout 2021
Cato Networks SASE Threat Research Report for Q3-2021
  • Network-based threat hunting helps identify previously unknown, unclassified threats
  • There’s an uptick in the usage of TOR and crypto miners on organizations’ networks
  • Exploit attempts focus on older PHP vulneraries as well as home cameras and routers
Cato Networks SASE Threat Research Report for Q2-2021
  • Why you should be concerned about Amazon Sidewalk coming to your network
  • What’s Spoofing-as-a-Service and how it’s important to the future of network protection
  • Which consumer threats are sneaking into enterprise networks
  • The top threats and countries of origin to consider in your security planning
Cato Networks SASE Threat Research Report for Q1-2021
  • Network-based threat hunting helps identify previously unknown, unclassified threats
  • There’s an uptick in the usage of remote administration tools, as well as attempts to brute force passwords to these tools
  • Attack source countries are not your usual suspects, so banning regions from the network may lead to a false sense of security while ignoring real threats