Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cato CTRL Threat Research: Suspected China-Linked Threat Actor Targets Global Manufacturer with Undocumented TencShell Malware

In April 2026, Cato CTRL identified and blocked an attempted intrusion against a global manufacturing customer involving TencShell, a previously undocumented, Go-based implant derived from the open-source Rshell C2 framework. The activity appeared in traffic associated with a third-party user connected to the customer environment.

The CRINK Catalog: In-Depth Resources to Navigate a New Era of Cyber Threats

The emergence of the CRINK axis—a coordinated cyber-threat nexus comprised of China, Russia, Iran, and North Korea—has dramatically impacted the 2026 global risk landscape. As these nation-states utilize AI-driven scale and living-off-the-land (LOTL) tactics to target critical infrastructure, SafeBreach’s new content series provides essential intelligence on their evolving motivations and methods.

Backed up is not the same as recoverable

The backup finished. The dashboard shows a green tick. You close the laptop and go home. But what if that green tick is lying to you? It sounds dramatic. It is not. Across organisations of every size, backups complete successfully every night while quietly storing corrupted data, broken recovery chains, or in the worst cases, malware that hitched a ride before the snapshot was taken. Nobody knows. Nothing alerts. The tick stays green. The problem only surfaces the moment you need the backup most.

Network modernization for a secure enterprise

Relying on legacy hardware for modern business is like trying to run a high-speed bullet train on old wooden tracks. The train has immense potential, but the underlying foundation simply can’t support the speed, capacity, or safety required for the journey. As companies migrate to the cloud and adopt artificial intelligence, their networks must evolve. Outdated systems create bottlenecks that drain resources and expose sensitive data to modern threats.

10 steps to trusted, validated autonomous IT

Because IT security no longer moves at human speed, endpoint management can no longer be seen as a background IT function. It’s now the front line and critical as ever. Attackers move fast, and AI makes them faster. Organizations can’t keep validating exposure and fixing issues the old way. Endpoint management has to run at machine speed because every manual handoff and every delayed exception adds more risk.

Mini Shai-Hulud supply chain attack: Why this campaign changes how defenders should think about trusted software

The Mini Shai-Hulud supply chain attack compromised more than 170 packages across npm and PyPI, including packages from TanStack, Mistral AI, and Guardrails AI, by hijacking legitimate CI/CD publishing workflows to distribute malicious versions that still carried apparently valid provenance signals.

What are runbooks? And how to automate them

Runbooks are supposed to be the safety net under operations. Unfortunately, most aren't because they live in wikis that decay as tools change, get linked from alerts but never consulted, and fail the responder the moment pressure arrives. The gap is between what the runbook says and what the responder can actually execute. Teams reach for AI to close the gap.

Shadow IT vs Shadow AI: What's the Difference?

Imagine a customer service representative at your organization uploads sensitive customer data into an AI tool to draft emails more quickly. When an employee uses an AI tool without IT approval, it is known as shadow AI, and such scenarios are becoming increasingly common. Among employees who use AI at work, 78% report using tools that have not been formally approved by their organization, according to Microsoft’s 2024 Work Trend Index.

Your AI Agents Are Already Acting. The Question Is Whether You Can See What They're Doing.

In conversations with CISOs about their agentic environments, the question I ask first is not whether they have agents deployed. Most do. It is not whether those agents are creating value. Most are. The question I ask is whether they have mapped their Agentic Security Graph. Almost none of them have. And that gap, between the agentic infrastructure that exists inside their organizations and the visibility they have into it, is where the most serious AI security risk in the enterprise lives right now.