- Cato CTRL Threat Research: ProKYC Selling Deepfake Tool for Account Fraud Attacks https://www.catonetworks.com/blog/prokyc-selling-deepfake-tool-for-account-fraud-attacks/ 2 comments technology
- Shrinking a Machine Learning Pipeline for AWS Lambda https://www.catonetworks.com/blog/shrinking-a-machine-learning-pipeline-for-aws-lambda/ 5 comments programming
- Lessons I've Learned While Scaling Up a Data Warehouse https://www.catonetworks.com/blog/lessons-ive-learned-while-scaling-up-a-data-warehouse/ 11 comments programming
- How to Identify Malicious Bots on your Network in 5 Steps https://www.catonetworks.com/blog/how-to-identify-malicious-bots-on-your-network-in-5-steps/ 3 comments programming
- Analysis of phishing kill chain identifies emerging technique that exploits trust in your collaboration platforms https://www.catonetworks.com/blog/analysis-of-phishing-kill-chain-identifies-emerging-technique-that-exploits-trust-in-your-collaboration-platforms/ 17 comments netsec
- Threat Intelligence Feeds and Endpoint Protection Systems Fail to Detect 24 Malicious Chrome Extensions https://www.catonetworks.com/blog/threat-intelligence-feeds-and-endpoint-protection-systems-fail-to-detect-24-malicious-chrome-extensions/ 4 comments programming
- How to Detect DNS Tunneling in the Network https://www.catonetworks.com/blog/how-to-detect-dns-tunneling-in-the-network/ 15 comments programming
- Schema-First approach has created solid API, reduces boilerplate, and eliminates human error https://www.catonetworks.com/blog/how-schema-first-approach-creates-better-api-reduces-boilerplate-and-eliminates-human-error/ 7 comments programming
- How to Detect DNS Tunneling in the Network https://www.catonetworks.com/blog/how-to-detect-dns-tunneling-in-the-network/ 21 comments netsec
- Log4J – A Look into Threat Actors Exploitation Attempts https://www.catonetworks.com/blog/log4j-a-look-into-threat-actors-exploitation-attempts/ 14 comments netsec
- An overview of private backbones and what they have to offer https://www.catonetworks.com/blog/does-your-backbone-have-your-back/ 7 comments programming
- How to Improve Elasticsearch Performance for Multitenant, Real-Time Architectures https://www.catonetworks.com/blog/how-to-improve-elasticsearch-performance-by-20x-for-multitenant-real-time-architectures/ 2 comments programming
- Shrinking a Machine Learning Pipeline for AWS Lambda https://www.catonetworks.com/blog/shrinking-a-machine-learning-pipeline-for-aws-lambda/ 4 comments aws
- How to Identify Malicious Bots on your Network https://www.catonetworks.com/blog/how-to-identify-malicious-bots-on-your-network-in-5-steps 8 comments programming