Blog/Tech/News
Technical Resources And Information
- The Good, the Bad and the Ugly in Cybersecurity – Week 38by SentinelOne (Cybersecurity Blog | SentinelOne) on September 22, 2023 at 1:00 pm
Cyber initiative to tackle threats in undermonitored regions, multiple businesses breached by old USB trick, and new APT targets telcos with novel backdoor.
- SentinelOne Achieves 100% Protection and Detection in the 2023 MITRE Engenuity ATT&CK® Evaluations: Enterpriseby Mark Dufresne (Cybersecurity Blog | SentinelOne) on September 20, 2023 at 1:00 pm
The SentinelOne Singularity Platform successfully detected and blocked at every step within the Evaluation.
- Risks Within The Factory Lines | Examining Top Threats Facing The Manufacturing Industryby SentinelOne (Cybersecurity Blog | SentinelOne) on September 19, 2023 at 12:54 pm
Learn how cybercriminals target the manufacturing sector and what strategies help stop attacks and safeguard customer trust and data.
- Ready, Set, Turla | Everything You Need to Know Before the MITRE ATT&CK® 2023 Evaluationsby Tim Woolford (Cybersecurity Blog | SentinelOne) on September 14, 2023 at 3:15 pm
Arm yourself with our deep dive into the MITRE ATT&CK evaluations and learn how they can guide you towards better cybersecurity investment decisions.
- Sep 2023 Cybercrime Update | New Ransomware Threats and the Rising Menace of Telegram by Jim Walter (Cybersecurity Blog | SentinelOne) on September 13, 2023 at 12:28 pm
Learn about the latest trends in cybercriminal activity, new actors, novel threats and evolving tools. Here's September's update.
- LABScon 2023 | Security Research in Real Time – Talks Not to Miss, Part Twoby SentinelOne (Cybersecurity Blog | SentinelOne) on September 12, 2023 at 1:29 pm
As LABScon 2023 approaches, we shine a spotlight on some of the research talks we are most excited about. Part Two.
- macOS MetaStealer | New Family of Obfuscated Go Infostealers Spread in Targeted Attacks by Phil Stokes (Cybersecurity Blog | SentinelOne) on September 11, 2023 at 1:46 pm
The rise of macOS infostealers continues with the latest entrant aiming to compromise business environments with targeted social engineering lures.
- LABScon 2023 | Security Research in Real Time – Talks Not to Miss, Part Oneby SentinelOne (Cybersecurity Blog | SentinelOne) on September 7, 2023 at 1:28 pm
As LABScon 2023 approaches, we shine a spotlight on some of the research talks we are most excited about. Part One.
- Feature Spotlight | Auto-Discover Unprotected Amazon EC2 Instances with Cloud Roguesby Rick Bosworth (Cybersecurity Blog | SentinelOne) on September 6, 2023 at 1:16 pm
Discover unprotected Amazon EC2 (VMs) in AWS and improve cloud risk management with Singularity Cloud Workload Security, real-time CWPP from SentinelOne.
- Protecting the Checkout Line | Understanding the Top Threats to Retail Cybersecurityby SentinelOne (Cybersecurity Blog | SentinelOne) on September 5, 2023 at 1:23 pm
Learn how cybercriminals target the retail sector and explore effective strategies to stop attacks and safeguard customer trust and data.
- Solving the SD-WAN Managed Service Puzzleby Highlight (Cisco Meraki Blog) on August 22, 2023 at 4:25 pm
Gamma Telecom leverages Highlight and Meraki SD-WAN for superior service delivery Read the full post.
- Your Competitive Edge Is a Cloud Strategyby Jason Crawford (Cisco Meraki Blog) on August 22, 2023 at 3:00 pm
Think beyond your legacy infrastructure to prepare your business for growth Read the full post.
- How scale and automation can enhance employee and constituent lives—reallyby Cisco Meraki (Cisco Meraki Blog) on August 10, 2023 at 3:30 pm
By removing repetitive, manual processes, staff can do more interesting tasks—and do more of them Read the full post.
- Enterprise Security Essentials | Top 12 Most Routinely Exploited Vulnerabilitiesby SentinelOne (Cyber Response - SentinelOne) on August 8, 2023 at 1:43 pm
CISA's top 12 routinely exploited security flaws has dropped. Learn more about each vulnerability and how to protect your business from it.
- Enhance Threat Detection at Schoolsby Singlewire (Cisco Meraki Blog) on August 3, 2023 at 10:38 pm
Leverage InformaCast and MT sensors to protect staff and students Read the full post.
- Ecosystem Stars Shine at Cisco Live U.S.by Ana Nennig (Cisco Meraki Blog) on July 27, 2023 at 3:30 pm
Meraki marketplace apps take center stage Read the full post.
- Securing the Future of Retailby Adriana Soto Ruiz (Cisco Meraki Blog) on July 25, 2023 at 5:25 pm
Five areas to converge cybersecurity and physical security Read the full post.
- The Network Management Journeyby George Mokdessi (Cisco Meraki Blog) on July 20, 2023 at 7:11 pm
Achieving cloud-management perfection for our customers Read the full post.
- Tackling the Challenges of Hybrid Cloud Securityby Imran Idrees (Cisco Meraki Blog) on July 19, 2023 at 3:30 pm
Make your journey to the cloud safer and more secure Read the full post.
- Driving Transformation in Manufacturingby Cisco Meraki (Cisco Meraki Blog) on July 18, 2023 at 3:30 pm
Automation everywhere is key to scalability Read the full post.
- Allbirds’ Retail Store Expansion Takes Flightby Andy Scholl (Cisco Meraki Blog) on July 6, 2023 at 6:52 pm
59 locations, three IT pros, one Meraki network Read the full post.
- SmoothOperator | Ongoing Campaign Trojanizes 3CXDesktopApp in Supply Chain Attackby Juan Andrés Guerrero-Saade (Cyber Response - SentinelOne) on March 29, 2023 at 11:06 pm
Trojanized malicious installers for enterprise PBX software kick off a multi-stage attack chain designed to deliver infostealer malware at scale.
- OpenSSL 3 Critical Vulnerability | What Do Organizations Need To Do Now?by SentinelOne (Cyber Response - SentinelOne) on October 31, 2022 at 2:33 pm
Learn about the critical vulnerability in OpenSSL 3.0.x. How important is it to patch, and what can businesses and enterprises do to mitigate the risk?
- Staying Ahead of CVE-2022-30190 (Follina) by SentinelOne (Cyber Response - SentinelOne) on May 31, 2022 at 10:30 pm
Microsoft Windows Support Diagnostic Tool is confirmed to be vulnerable to a zero-click, zero day vulnerability. Read how to prepare your cyber response
- Enterprise Security Essentials | Top 15 Most Routinely Exploited Vulnerabilities 2022by SentinelOne (Cyber Response - SentinelOne) on April 28, 2022 at 2:57 pm
Unpatched flaws are a threat actor's stock-in-trade but also a vector within your control. Learn about the bugs being used to attack businesses today.
- Cyber War Elements In The Ukrainian Conflict | Hosted by the Alperovitch Institute for Cybersecurity Studiesby SentinelOne (Cyber Response - SentinelOne) on March 7, 2022 at 7:08 pm
Cyber security's most distinguished speakers discuss the current situation around the Ukrainian conflict. Where is the cyberwar? And where are all the APTs?
- Log4j One Month On | Crimeware and Exploitation Roundupby SentinelOne (Cyber Response - SentinelOne) on January 10, 2022 at 6:36 pm
31 days since the first Log4j CVE, but what's happened since then? We round up all the CVEs, attacks, reactions from researchers and a new JNDI bug.
- CVE-2021-44228: Staying Secure – Apache Log4j Vulnerabilityby SentinelOne (Cyber Response - SentinelOne) on December 11, 2021 at 12:46 am
Apache Log4j2, a Java-based logging tool, is being tracked as CVE-2021-44228. Read SentinelOne's blog to learn more about the exploit and ways to stay protected.
- Peeking into CVE-2021-40444 | MS Office Zero-Day Vulnerability Exploited in the Wildby Rafel Ivgi (Cyber Response - SentinelOne) on September 23, 2021 at 5:40 pm
Threat actors continue to leverage a vulnerability in MSHTML to drop a Cobalt Strike Beacon and infect unwary users. Are you protected?
- HiveNightmare | Protecting Windows 10 Security Account Manager Against CVE-2021-36934by SentinelOne (Cyber Response - SentinelOne) on August 5, 2021 at 4:25 pm
HiveNightmare is a Windows 10 Local Privilege Escalation vulnerability that is trivial to exploit. Learn how it is used in attacks and how to mitigate it.