The Cryptocurrency Mining Threats to Enterprise Security, Cato Networks Sees Fast Growth And More In This Weeks News

The growing concern around cryptocurrency mining and its threats

The Hacker News recently contacted Cato Networks and asked for more information about how exactly can cryptocurrency mining threats impact enterprise security. Cato Research Labs determined crypto mining represents a moderate threat to the organization. Immediate disruption of the organization infrastructure or loss of sensitive data is not likely to be a direct outcome of crypto mining, but there’s still a threat businesses need to be prepared for. There are two major risks when it comes to this topic – non-intentionally installed mining software on enterprise computers will raise costs of electricity and shorten the life of processors and batteries within laptops and there’s also a risk that the infected enterprise computers can become a part of a botnet to launch attacks.

Close-up of a Bitcoin symbol on a printed circuit board.

Read more: The Hacker News

Book a demo today to see GlobalDots is action.

Optimize cloud costs, control spend, and automate for deeper insights and efficiency.

Book a demo today to see GlobalDots is action.

Cato Networks – 100’s of clients, 1000’s of branches and 39 PoPs

Cato Networks, a software-defined wide-area networking (SD-WAN) company saw rapid growth last year. Their sequential booking growth grew to 100% quarter-over-quarter across 2017. The average size of their deals increased by 400%. Cato Cloud has a larger network footprint worldwide than any other SD-WAN that is cloud based with their 39 PoP placed globally including 2 that are based in China.

Cato Networks logo featuring the words 'Global Backbone',SD-WAN',Firewall as a Service',and 'All-in-One'.

Read more: Bizety

PacketZoom and AWS CloudFront partner on mobile CDN

On February 6th PacketZoom announced they were partnering up with AWS CloudFront’s Web CDN which makes them the first mobile app performance company to offer end-to-end bundled mobile networking solution – Mobile App Performance Management and Optimization (APMO).

“The benefits are twofold: (a) Technical – AWS customers will maximize PacketZoom performance value since both solutions are running from the same data centers and hence minimizing inter cloud latencies; and (b) Commercial – Thanks to economies of scale, PacketZoom should be able to offer the bundled solution at a much lower price.”
– Shlomi Gian (CEO at PacketZoom)

Logos of Amazon CloudFront and PacketZoom
Image Source

Read more: Bizety

Infraud cybercrime forum bust

The U.S. Justice Department announced charges against 36 individuals thought to be the members of Infraud, a cybercrime forum that federal prosecutors say cost customers more than $0.5B. Started in October 2010, Infraud was short for “In Fraud We Trust,” and collectively the forum referred to itself as the “Ministry of Fraudulently Affairs.” As a mostly English-language fraud forum, Infraud attracted nearly 11,000 members from around the globe who sold, traded and bought everything from stolen identities and credit card accounts to ATM skimmers, botnet hosting and malicious software.

A black eagle with wings spread over a red cross on a gray background.
Image Source

Read more: KrebsonSecurity

A Vietnamese hacker launches a domain theft attack that stranded thousands of websites

Newtek Business Services Corp., a web services conglomerate that operates more than 100 000 business websites and around 40 000 managed technology accounts had three of their core domains hijacked by a Vietnamese hacker who replaced the login page many Newtek customers used to remotely manage their websites with a live chat service. Instead of Newtek customers seeking answers on why their websites were no longer resolved correctly, they ended up chatting with the hijacker instead.

Grid of business solution categories with action buttons.

Read more: KrebsonSecurity

Latest Articles

Vulnerability Assessments vs. Penetration Testing: Key Differences, Use Cases & Best Practices

They’re not interchangeable. A vulnerability assessment identifies known flaws at scale. A penetration test mimics an actual attacker probing for impact. Yet many teams treat them the same. They substitute one for the other, check a compliance box, and move on as if they’re covered. They’re not. And that gap shows up later in real-world […]

Ganesh The Awesome
7th July, 2025
Web Application Firewalls (WAFs): The Evolving First Line of Defense in Cloud Security

Modern applications are built for speed, not simplicity. Containers, microservices, and cloud-native deployments have blown up the security perimeter. Traditional tools can’t keep up with this complexity. That’s why Web Application Firewalls (WAFs) matter. But the WAF of 2025 isn’t just an appliance sitting in front of a static website. It’s a flexible, cloud-aware security […]

Ganesh The Awesome
7th July, 2025
What is an API Security Audit?

 In January 2024, a misconfigured API exposed 650,000 private messages. These included passwords and internal communications. No exploit chain. No zero-day. Just a public-facing endpoint with no authentication. This wasn’t an isolated incident. From T-Mobile and Twitter (now X) to Kronos Research and the US Treasury, attackers have consistently used APIs as entry points. They […]

Ganesh The Awesome
26th June, 2025
The Ultimate API Security Checklist for 2025

APIs are now the top attack vector in enterprise apps. In 2024 alone, breaches tied to APIs cost an average of $4.88 million, and that number is rising fast. Attackers exploit gaps in API authentication, input validation, and outdated endpoints to compromise systems. Legacy controls no longer suffice, and the OWASP API Top 10 outlines […]

Ganesh The Awesome
26th June, 2025

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.

    GlobalDots' industry expertise proactively addressed structural inefficiencies that would have otherwise hindered our success. Their laser focus is why I would recommend them as a partner to other companies

    Marco Kaiser
    Marco Kaiser

    CTO

    Legal Services

    GlobalDots has helped us to scale up our innovative capabilities, and in significantly improving our service provided to our clients

    Antonio Ostuni
    Antonio Ostuni

    CIO

    IT Services

    It's common for 3rd parties to work with a limited number of vendors - GlobalDots and its multi-vendor approach is different. Thanks to GlobalDots vendors umbrella, the hybrid-cloud migration was exceedingly smooth

    Motti Shpirer
    Motti Shpirer

    VP of Infrastructure & Technology

    Advertising Services