Blog

Exit Sandman | How SentinelOne Deflects APT-Level Identity Security Risks

Information theft and the number of data breaches rooted in identity-based risks are rising as attackers continue to exploit vulnerabilities and find ways to evade detection. This makes early detection one of the most critical pillars of defense across today’s attack surfaces. As identity-based threats continue to develop, organizations that focus on advanced detection and …

Exit Sandman | How SentinelOne Deflects APT-Level Identity Security Risks Read More »

PinnacleOne ExecBrief | Enterprise Risk Management in China

Last week, PinnacleOne flagged the ongoing SVR exploitation of their breach of Microsoft. This week, we examine the geopolitical dynamics and risks facing firms that do business or have key dependencies in China and highlight principles to frame a China-for-China strategy given firm-specific threat models. Please subscribe to read future issues — and forward this …

PinnacleOne ExecBrief | Enterprise Risk Management in China Read More »

Insights from the CyberLaw Forum | Intersecting Cybersecurity, Insurance & Regulation

SentinelOne’s CyberLaw Forum brings together lawyers, technical experts, and insurance executives to dive deep into challenges faced in today’s cyber insurance and legal realms. From the tactics of threat actors to contemplating the impact of artificial intelligence (AI) on enterprise security strategies, panelists from the event delved into the intricacies of cybersecurity in a rapidly …

Insights from the CyberLaw Forum | Intersecting Cybersecurity, Insurance & Regulation Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 12

The Good | Russian Nationals Sanctioned for Roles in GRU-Linked Influence Campaigns Two Russian nationals are the latest to be sanctioned by the U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) this week for their roles in various malign influence campaigns. Ilya Andreevich Gambashidze, the founder of Social Design Agency (SDA), and Nikolai Aleksandrovich …

The Good, the Bad and the Ugly in Cybersecurity – Week 12 Read More »

Experiencing a Data Breach? 8 Steps for Effective Incident Response

Experiencing a breach? Call us immediately at 1-855-868-3733. If you would like to discuss your organization’s security posture, contact us here and our team will be in touch shortly. Data breaches have been all over the news lately. Understanding how to prevent them—and what to do when they happen—is essential to every organization’s operational success. …

Experiencing a Data Breach? 8 Steps for Effective Incident Response Read More »

S Ventures Invests in Auguria to Solve SecOps Overload

We are excited to announce S Ventures investment in Auguria to empower the vision of achieving 90%+ efficiency in SOC investigations and reducing SIEM costs. Auguria is driving the transformation of traditional security operations by optimizing data for human and AI consumption with the industry’s first Security Knowledge Layer. SecOps’ Data Dilemma | How to …

S Ventures Invests in Auguria to Solve SecOps Overload Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 11

The Good | Top LockBit Ransomware Admin Charged & Ordered to Pay Restitutions Russian-Canadian cybercriminal Mikhail Vasiliev has been sentenced to nearly four years in prison for his involvement in the LockBit ransomware operation. Initially arrested in November 2022, Vasiliev has pled guilty to eight charges, including cyber extortion, mischief, and weapons-related allegations. Court sketch …

The Good, the Bad and the Ugly in Cybersecurity – Week 11 Read More »

PinnacleOne ExecBrief | Nation-State Targeting of Enterprise Cloud

Key Takeaways The Russian Foreign Intelligence Service (SVR) continues to intensively exploit their breach of Microsoft, leveraging access to source code, internal systems, and sensitive data including Microsoft executive’s emails and customer secrets. This poses severe risks to organizations using Microsoft’s products and services. Microsoft’s communications have been minimal and inadequate, likely because it lacks …

PinnacleOne ExecBrief | Nation-State Targeting of Enterprise Cloud Read More »

Exploiting Repos | 6 Ways Threat Actors Abuse GitHub & Other DevOps Platforms

For millions of organizations today, source code management platforms like GitHub play a fundamental role in software development, operating as a central hub for both proprietary and open-source code repositories, enabling collaboration, version control and continuous integration and deployment (CI/CD). In this blog post, we explore the less-discussed side of these essential platforms, where threat …

Exploiting Repos | 6 Ways Threat Actors Abuse GitHub & Other DevOps Platforms Read More »