Hacktivism in the Israel-Hamas Conflict | Citizen Data Leaked Using Old Malware

The current conflict between Israel and the Hamas militant group has begat an onslaught of hacktivist-level activity carried out in the name of both sides. Amongst the ongoing fighting, numerous hacktivist groups and ‘lone wolves’ have taken the opportunity to maneuver into the cyber arena, deploying an array of malicious activities including Distributed-Denial-of-Service (DDoS) attacks, […]

Hacktivism in the Israel-Hamas Conflict | Citizen Data Leaked Using Old Malware Read More »

Decrypting SentinelOne’s Detection | An In-depth Look at Our Real-Time CWPP Static AI Engine

Artificial intelligence (AI) is such a hot topic right now with everyone clamoring to say how their company is leveraging AI in all the new, flashy ways. Here at SentinelOne, we don’t do hype or hyperbole and AI is nothing new. We were founded in 2013 on the premise that AI could fundamentally transform cybersecurity

Decrypting SentinelOne’s Detection | An In-depth Look at Our Real-Time CWPP Static AI Engine Read More »

The Realm of Ethical Hacking | Red, Blue & Purple Teaming Explained

Businesses continue to digitize their critical infrastructures and operations, expanding their attack surface and exposure to various threat vectors. To combat this, leaders are recognizing the value of having in-house experts who can think like cybercriminals and help build a proactive stance against attackers. Considering new and constant developments in the cyber threat landscape, business

The Realm of Ethical Hacking | Red, Blue & Purple Teaming Explained Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 42

The Good | Ragnar Locker’s Tor & Leak Sites Taken Down In International Seizure Ragnar Locker took a serious blow this week when authorities seized the ransomware operation’s Tor negotiation and data leak sites. This is the latest takedown coordinated across over a dozen international authorities. Now, visitors to the once-infamous sites are greeted with

The Good, the Bad and the Ugly in Cybersecurity – Week 42 Read More »

Social Engineering Attacks | How to Recognize and Resist The Bait

While much of cyber news often revolves around novel malware strains and high-profile data breaches, one threat that often flies under the radar relies on human vulnerability rather than technical vulnerabilities: social engineering attacks. This type of attack exploits people’s most innate tendency to trust, comply, and share information. This is what makes these attacks

Social Engineering Attacks | How to Recognize and Resist The Bait Read More »

Oct 2023 Cybercrime Update | Disinformation, DDoS and Scams as Gangs Look to Exploit Turmoil

In this blog post, we delve into the notable trends that have been shaping the cyber landscape over the past month. With the conflict between Israel and Hamas dominating the news cycle, we look at how this is currently impacting cybersecurity, and provide updates on ransomware and other cybercrime activity to help security leaders stay

Oct 2023 Cybercrime Update | Disinformation, DDoS and Scams as Gangs Look to Exploit Turmoil Read More »

A Modern Approach to Adaptive Threat Hunting Methodologies

Threat hunting encompasses a range of techniques and approaches aimed at discovering anomalies, threats, and risks associated with attacker activities. In the early days, log review by diligent system administrators was how these anomalies were detected, usually after the fact. This evolved into more structured methodologies created by security experts that attempted to identify these

A Modern Approach to Adaptive Threat Hunting Methodologies Read More »