Cato’s Cyber Threat Research Lab (Cato CTRL) has recently released its first SASE threat report, providing comprehensive insights into enterprise and network threats. The report is based on Cato’s extensive and detailed network analysis capabilities.
The SASE Threat Report covers threats from a strategic, tactical, and operational perspective, using the MITRE ATT&CK framework. It includes malicious and suspicious activities, as well as applications, protocols, and tools running on networks. The report is based on detailed data from every traffic flow from each endpoint communicating through the Cato SASE Cloud Platform, leveraging over 2200 clients, 1.26 trillion network flows, and 21.45 billion blocked attacks.
Cato CTRL, a combination of top-tier human intelligence and comprehensive network and security expertise, provides a unique view of the latest cyber threats and threat actors. It offers tactical data to SOC, operational threat intelligence to managers, and strategic reports to executive teams and boards, supporting trend monitoring and industry event analysis.
The report’s top 8 findings and insights include widespread adoption of AI in enterprises, hacker discussions, prominent brands being impersonated, lateral movement across corporate networks, non-zero-day real threats, industry-specific security exploits, the importance of context, and 1% adoption of DNSSEC. For more in-depth insights into existing threats, vulnerabilities, hacker communities, and enterprise behavior, the full report is recommended.
Vía The Hacker News