Cato CTRL (@catoctrl) 's Twitter Profile
Cato CTRL

@catoctrl

Cato CTRL is the threat intelligence team at @CatoNetworks. Follow for the latest insights and threat research.

ID: 1899395331818950656

linkhttps://www.catonetworks.com/cato-ctrl/ calendar_today11-03-2025 09:42:33

65 Tweet

110 Followers

3 Following

Cato CTRL (@catoctrl) 's Twitter Profile Photo

🚨 Our latest threat research reveals how #ransomware gangs are leveraging #RMM tools for stealthy intrusions. Tactics include: 🔁 Gaining persistence ↔️ Conducting lateral movement 📁 Exfiltrating data Read more: catonetworks.com/blog/cato-ctrl…

🚨 Our latest threat research reveals how #ransomware gangs are leveraging #RMM tools for stealthy intrusions.    

Tactics include:   
🔁 Gaining persistence  
↔️ Conducting lateral movement  
📁 Exfiltrating data   

Read more: catonetworks.com/blog/cato-ctrl…
Cato CTRL (@catoctrl) 's Twitter Profile Photo

We've published a detailed overview of LAMEHUG. LAMEHUG is an LLM-powered malware discovered by the Computer Emergency Response Team of Ukraine (CERT-UA). According to CERT-UA, LAMEHUG has links to APT28 (Fancy Bear). Read more: bit.ly/4f4RyuC

We've published a detailed overview of LAMEHUG. LAMEHUG is an LLM-powered malware discovered by the Computer Emergency Response Team of Ukraine (CERT-UA). According to CERT-UA, LAMEHUG has links to APT28 (Fancy Bear).

Read more: bit.ly/4f4RyuC
Cato CTRL (@catoctrl) 's Twitter Profile Photo

⚠️ Critical Microsoft SharePoint vulnerabilities are currently being exploited in the wild by nation-state threat actors. Read our latest brief on "ToolShell", a chained exploit targeting Microsoft SharePoint Server. Stay protected: bit.ly/3H1Kn9N

⚠️ Critical Microsoft SharePoint vulnerabilities are currently being exploited in the wild by nation-state threat actors. Read our latest brief on "ToolShell", a chained exploit targeting Microsoft SharePoint Server. 

Stay protected: bit.ly/3H1Kn9N
Cato CTRL (@catoctrl) 's Twitter Profile Photo

😎Proud to be a Gold Sponsor of Recon Village at #DEFCON2025, Aug 8–10 in Las Vegas. Vitaly Simonovich, Threat Intel Researcher Cato Networks CTRL, will be on-site connecting with fellow researchers on advanced threats & defense. See you there 👉 reconvillage.org

😎Proud to be a Gold Sponsor of <a href="/ReconVillage/">Recon Village</a> at #DEFCON2025, Aug 8–10 in Las Vegas. Vitaly Simonovich, Threat Intel Researcher <a href="/CatoNetworks/">Cato Networks</a> CTRL, will be on-site connecting with fellow researchers on advanced threats &amp; defense. See you there 👉 reconvillage.org
Cato CTRL (@catoctrl) 's Twitter Profile Photo

🚨 A Streamlit vulnerability could let threat actors conduct cloud account takeover attacks and manipulate stock market dashboards. We found it. Streamlit patched it. But the risk to open-source application frameworks remain. Read more 👉 catonetworks.com/blog/cato-ctrl…

🚨 A Streamlit vulnerability could let threat actors conduct cloud account takeover attacks and manipulate stock market dashboards.

We found it. Streamlit patched it. But the risk to open-source application frameworks remain.

Read more 👉 catonetworks.com/blog/cato-ctrl…
Cato CTRL (@catoctrl) 's Twitter Profile Photo

🚨Most orgs have Zero Trust ambition—but struggle with execution. Join Etay Maor and Jason Garbis for a Cybersecurity Masterclass on a 4-phase framework you’ll wish you had from day one. Register now 👉 catonetworks.com/resources/cybe…

🚨Most orgs have Zero Trust ambition—but struggle with execution. Join Etay Maor and <a href="/jasongarbis/">Jason Garbis</a>  for a Cybersecurity Masterclass on a 4-phase framework you’ll wish you had from day one. Register now 👉 catonetworks.com/resources/cybe…
Cato CTRL (@catoctrl) 's Twitter Profile Photo

👏 Congratulations to Vitaly Simonovich, Threat Intelligence Researcher at Cato Networks, for being acknowledged by Microsoft for disclosing the “Immersive World” jailbreak as featured in the 2025 Cato CTRL Threat Report. Read the full report: catonetworks.com/report

👏 Congratulations to Vitaly Simonovich, Threat Intelligence Researcher at Cato Networks, for being acknowledged by <a href="/Microsoft/">Microsoft</a> for disclosing the “Immersive World” jailbreak as featured in the 2025 Cato CTRL Threat Report.

Read the full report: catonetworks.com/report
Cato Networks (@catonetworks) 's Twitter Profile Photo

Think you can tell cybersecurity heavyweights from sci-fi legends? 🎬 Etay Maor, Chief Security Strategist at Cato, thought so too, until a quote left him speechless (and slightly heartbroken). 😅 Watch on and test your own cyber + pop culture instincts. #SASE #cybersecurity

Cato CTRL (@catoctrl) 's Twitter Profile Photo

🚨Threat alert: We recently observed a new malvertising campaign from Oyster, which is a malware loader used in malicious activities.🐚 Cato customers - already protected. Read more 👉catonetworks.com/blog/cato-ctrl…

🚨Threat alert: We recently observed a new malvertising campaign from Oyster, which is a malware loader used in malicious activities.🐚

Cato customers - already protected.

Read more 👉catonetworks.com/blog/cato-ctrl…
Cato CTRL (@catoctrl) 's Twitter Profile Photo

🚨Cato CTRL Threat Alert: Lumma Stealer is spreading via PowerShell. IOCs: https[://]ethan-cole-digital[.]space/cf-device-auth[.]cmd https[://]ethan-cole-studio[.]site/gjak.odd

🚨Cato CTRL Threat Alert: Lumma Stealer is spreading via PowerShell. 
IOCs: https[://]ethan-cole-digital[.]space/cf-device-auth[.]cmd 
https[://]ethan-cole-studio[.]site/gjak.odd
Cato CTRL (@catoctrl) 's Twitter Profile Photo

🚨 新たな脅威リサーチ:私たちは、GrokとMixtralを基盤とするWormGPTの新種を発見しました。 詳しくはこちら👉  catonetworks.com/ja/blog/cato-c… #ThreatIntel #WormGPT

🚨 新たな脅威リサーチ:私たちは、GrokとMixtralを基盤とするWormGPTの新種を発見しました。

詳しくはこちら👉  catonetworks.com/ja/blog/cato-c…

#ThreatIntel #WormGPT
Cato CTRL (@catoctrl) 's Twitter Profile Photo

6 hours. 3 GenAI tools breached. No coding ☠️ Vitaly Simonovich, Threat Researcher & CTRL member bypassed ChatGPT, Copilot, & DeepSeek's guardrails, tricking them into creating credential-stealing malware. Is your security ready? Read more The Economist 👉 economist.com/business/2025/…

6 hours. 3 GenAI tools breached. No coding ☠️
Vitaly Simonovich, Threat Researcher &amp; CTRL member bypassed ChatGPT, Copilot, &amp; DeepSeek's guardrails, tricking them into creating credential-stealing malware.
Is your security ready? Read more <a href="/TheEconomist/">The Economist</a> 👉
economist.com/business/2025/…