Unified Security: It’s Not Just About the Technology
Bringing together teams and technology to strengthen your security strategy Read the full post.
Unified Security: It’s Not Just About the Technology Read More »
Bringing together teams and technology to strengthen your security strategy Read the full post.
Unified Security: It’s Not Just About the Technology Read More »
Recent reports from researchers at BitDefender and Elastic have exposed an active adversary deploying novel spyware, cross-platform backdoors and an open-source reconnaissance tool to compromise organizations with macOS devices in their fleets. Although the number of known victims at this time is small, the nature of the tooling suggests that the threat actors have likely
JokerSpy | Unknown Adversary Targeting Organizations with Multi-Stage macOS Malware Read More »
The Rhysida ransomware-as-a-service (RaaS) group has gone from a dubious newcomer to a fully-fledged ransomware operation. Despite the developer’s partial implementation of some features, the group emerged onto the scene at the end of May with a high-profile attack against the Chilean Army, continuing the ongoing trend of ransomware groups targeting Latin American government institutions.
Rhysida Ransomware | RaaS Crawls Out of Crimeware Undergrowth to Attack Chilean Army Read More »
In partnership with vx-underground, SentinelOne recently ran its first Malware Research Challenge, in which we asked researchers across the cybersecurity community to submit previously unpublished work to showcase their talents and bring their insights to a wider audience. Today’s post marks the start of a series highlighting the best entries, beginning with the winner from
Neo_Net | The Kingpin of Spanish eCrime Read More »
Threat actors are constantly evolving, consistently developing the tools, tactics, and procedures (TTPs) they use in attacks. In today’s threat landscape, enterprises of all sizes and industries find themselves pitted against professional cybercriminal gangs, advanced persistent threat (APT) groups, and even nation-state actors – all of whom are leveraging faster attack methods than ever before.
Cybersecurity In The Fast Lane | Why Speed Is Key In Incident Response & Mitigation Read More »
59 locations, three IT pros, one Meraki network Read the full post.
Allbirds’ Retail Store Expansion Takes Flight Read More »
In partnership with vx-underground, SentinelOne recently ran its first Malware Research Challenge, in which we asked researchers across the cybersecurity community to submit previously unpublished work to showcase their talents and bring their insights to a wider audience. Today’s post is the second in a series highlighting the best entries. Jared Stroud (@DLL_Cool_J / Arch
Analyzing Attack Opportunities Against Information Security Practitioners Read More »
We believe that generative AI has the potential to generate massive value and disrupt existing industries and applications. We are now witnessing generative AI accomplish things on a daily basis that just a short time ago did not seem possible. Generative AI has a meaningful role to play in cybersecurity, both for the good guys
What It Takes to be a Top Gun | GenAI & Cybersecurity Read More »