Blog

The Good, the Bad and the Ugly in Cybersecurity – Week 21

The Good | Leaders of Crypto Investment Scam Arrested & Charged for $73 Million Laundering Scheme This week, the tables were turned on two alleged cyber ‘pig butcherers’ who could now face time in the iron pen. The DoJ indicted Daren Li (41) and Yicheng Zhang (38) for their alleged roles leading a global syndicate …

The Good, the Bad and the Ugly in Cybersecurity – Week 21 Read More »

Ikaruz Red Team | Hacktivist Group Leverages Ransomware for Attention Not Profit

Politically-motivated hacktivist groups are increasingly utilizing ransomware payloads both to disrupt targets and draw attention to their political causes. Notable among these is Ikaruz Red Team, a threat actor that is currently leveraging leaked ransomware builders to launch attacks against critical infrastructure targets in the Philippines, including the government’s Department of Science and Technology. In …

Ikaruz Red Team | Hacktivist Group Leverages Ransomware for Attention Not Profit Read More »

PinnacleOne ExecBrief | AI and Foreign Election Interference

Last week, PinnacleOne considered what the Office of National Cyber Director’s Annual Report means to modern enterprises. This week, we highlight the convergence of AI and foreign malign influence efforts on the 2024 year of global elections. Please subscribe to read future issues — and forward this newsletter to interested colleagues. Contact us directly with …

PinnacleOne ExecBrief | AI and Foreign Election Interference Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 20

The Good | International Law Enforcement Charge Crypto Criminals & Take Down a New Iteration of BreachForums In the past week, law enforcement agencies took down cryptocurrency thieves responsible for a multi-million dollar theft from the Ethereum blockchain, and seized a second iteration of the notorious hacking platform, BreachForums. The DoJ has unsealed an indictment …

The Good, the Bad and the Ugly in Cybersecurity – Week 20 Read More »

RSAC 2024 Recap | Advancing the Power of Possibility Through Community

Last week, the SentinelOne team wrapped up another exciting year at RSA Conference 2024. The four-day event was, as usual, an invaluable opportunity to connect with leaders across the community, share stories, and learn from each other. This year’s event garnered attendees numbering 40,000 strong from more than 130 countries, showing just how much expertise …

RSAC 2024 Recap | Advancing the Power of Possibility Through Community Read More »

Securing Peace of Mind with Breach Response Warranty

Running a business means accepting all of its fluctuating risks and uncertainties. For business leaders, one of the major challenges is managing their cybersecurity posture in an ever-changing threat landscape. With rapid digitalization and increasingly opportunistic attackers to consider, small to medium-sized businesses (SMBs) can be especially vulnerable. Based on recent reports, over 40% of …

Securing Peace of Mind with Breach Response Warranty Read More »

Unify the Analyst Experience with Singularity Operations Center

On April 26, 2024, SentinelOne marked a significant milestone in security management with the launch of the Singularity Operations Center, the new unified security console. This major update to the Singularity Platform is now generally available (GA) to all cloud-native customers, representing a pivotal shift to a more integrated and efficient analyst experience for security …

Unify the Analyst Experience with Singularity Operations Center Read More »

Cloud Native Security | Prioritize Better, Respond Faster, with Verified Exploit Paths™

This week, SentinelOne launched Singularity Cloud Native Security (CNS), our agentless Cloud Native Application Protection Platform (CNAPP) uniquely designed to assess cloud environments through the eyes of a threat actor. As attackers increasingly target cloud environments, SentinelOne’s latest solution helps organizations better defend against these attacks. CNS simulates attack methods to verify exploit pathways, so-called …

Cloud Native Security | Prioritize Better, Respond Faster, with Verified Exploit Paths™ Read More »

PinnacleOne ExecBrief | Cyber Strategy in Focus: Talent, Tools, and Intel

Last week, PinnacleOne examined the growing trend towards digital sovereignty, manifesting in national competition to secure and lead increasingly strategic cloud, AI, and space networks. This week, we consider what the Office of National Cyber Director’s Annual Report means to modern enterprises. Please subscribe to read future issues — and forward this newsletter to interested …

PinnacleOne ExecBrief | Cyber Strategy in Focus: Talent, Tools, and Intel Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 19

The Good | Russian-Based APT28 & LockBit Developer Condemned and Charged by International Enforcement International law enforcement agencies took a hard stance against GRU-linked threat actors this week with the official condemnation of APT28 (aka Strontium, Fancy Bear, Forest Blizzard) and identification and sanctioning of LockBit ransomware’s administrator and developer. NATO and the EU, joined …

The Good, the Bad and the Ugly in Cybersecurity – Week 19 Read More »