Securing the Future of Retail
Five areas to converge cybersecurity and physical security Read the full post.
Securing the Future of Retail Read More »
Five areas to converge cybersecurity and physical security Read the full post.
Securing the Future of Retail Read More »
In partnership with vx-underground, SentinelOne recently ran its first Malware Research Challenge, in which we asked researchers across the cybersecurity community to submit their research to showcase their talents and bring their insights to a wider audience. In today’s post, researcher Ankith Bharadwaj (@bherund) delves into the murkly world of Windows PowerShell obfuscation techniques, widely
Deconstructing PowerShell Obfuscation in Malspam Campaigns Read More »
Achieving cloud-management perfection for our customers Read the full post.
The Network Management Journey Read More »
Modern enterprises have rapidly adopted hybrid cloud environments to harness the benefits of both on-prem infrastructure and public cloud services. With higher rates of adoption and nearly half of all breaches occurring in the cloud, the question of how to secure this growing hybrid cloud landscape has become a top priority for business leaders. One
Make your journey to the cloud safer and more secure Read the full post.
Tackling the Challenges of Hybrid Cloud Security Read More »
Automation everywhere is key to scalability Read the full post.
Driving Transformation in Manufacturing Read More »
To combat a growing range of cyber threats, enterprise leaders and cybersecurity professionals often employ tabletop exercises as a valuable tool to enhance preparedness and response capabilities. Tabletop exercises simulate real-world cyber incidents in a controlled environment, allowing organizations to test their incident response plans, evaluate team coordination, and identify vulnerabilities. As the overall threat
Strengthening Cyber Defenses | A Guide to Enhancing Modern Tabletop Exercises Read More »
In partnership with vx-underground, SentinelOne recently ran its first Malware Research Challenge, in which we asked researchers across the cybersecurity community to submit their research to showcase their talents and bring their insights to a wider audience. In today’s post, Millie Nym demonstrates a problem-solving approach to reverse engineering a malware sample, highlighting not just
Reverse Engineering Walkthrough | Analyzing A Sample Of Arechclient2 Read More »
In a special event hosted by the Alperovitch Institute, some of cyber security’s most distinguished speakers share their thoughts on the unfolding cyberwar in the midst of the Ukrainian conflict. Aside from the DDoS attacks and website defacements, and a sense of heightened alert around the globe, there has so far been a lack of
Last week, the OpenSSL project team announced the release of OpenSSL version 3.0.7, which was made available on Tuesday, November 1st. The update is a security fix for two vulnerabilities in OpenSSL 3.0.x, and developers and organizations are being urged to ensure that they patch any instances of OpenSSL 3 in their software stack as
OpenSSL 3 Critical Vulnerability | What Do Organizations Need To Do Now? Read More »