BlueNoroff | How DPRK’s macOS RustBucket Seeks to Evade Analysis and Detection

Back in April, researchers at JAMF detailed a sophisticated APT campaign targeting macOS users with multi-stage malware that culminated in a Rust backdoor capable of downloading and executing further malware on infected devices. ‘RustBucket’, as they labeled it, was attributed with strong confidence to the BlueNoroff APT, generally assumed to be a subsidiary of the …

BlueNoroff | How DPRK’s macOS RustBucket Seeks to Evade Analysis and Detection Read More »

Cybersecurity In The Fast Lane | Why Speed Is Key In Incident Response & Mitigation

Threat actors are constantly evolving, consistently developing the tools, tactics, and procedures (TTPs) they use in attacks. In today’s threat landscape, enterprises of all sizes and industries find themselves pitted against professional cybercriminal gangs, advanced persistent threat (APT) groups, and even nation-state actors – all of whom are leveraging faster attack methods than ever before. …

Cybersecurity In The Fast Lane | Why Speed Is Key In Incident Response & Mitigation Read More »

Analyzing Attack Opportunities Against Information Security Practitioners

In partnership with vx-underground, SentinelOne recently ran its first Malware Research Challenge, in which we asked researchers across the cybersecurity community to submit previously unpublished work to showcase their talents and bring their insights to a wider audience. Today’s post is the second in a series highlighting the best entries. Jared Stroud (@DLL_Cool_J / Arch …

Analyzing Attack Opportunities Against Information Security Practitioners Read More »

What It Takes to be a Top Gun | GenAI & Cybersecurity

We believe that generative AI has the potential to generate massive value and disrupt existing industries and applications. We are now witnessing generative AI accomplish things on a daily basis that just a short time ago did not seem possible. Generative AI has a meaningful role to play in cybersecurity, both for the good guys …

What It Takes to be a Top Gun | GenAI & Cybersecurity Read More »

Getting More From Cloud | How to Maximize Business Value Through CloudOps Services

With more businesses relying on cloud computing to streamline operations and improve scalability, enterprise leaders are adopting a cloud-first approach, combining network, performance, security, endpoint management, and support all through cloud operations, or CloudOps. CloudOps combines both IT processes and DevOps principles to ensure the smooth operation, maintenance, and optimization of a cloud-based infrastructure and …

Getting More From Cloud | How to Maximize Business Value Through CloudOps Services Read More »