Blog

LOLKEK Unmasked | An In-Depth Analysis of New Samples and Evolving Tactics

Awareness of the newest shifts and patterns is vital in the fast-changing world of cyber threats. This rings particularly true with ransomware, known for its quick changes and intricate tactics. This past August, our MDR team at SentinelOne stumbled upon something unusual in the wild: new instances of LOLKEK, or GlobeImposter as it’s also known, …

LOLKEK Unmasked | An In-Depth Analysis of New Samples and Evolving Tactics Read More »

Enterprise Security Essentials | Top 12 Most Routinely Exploited Vulnerabilities

Leveraging known bugs and unpatched exploits continue to be an unyielding strategy for threat actors. Ranging from security bypasses and credential exposure to remote code execution, software vulnerabilities remain tools of the trade for cyber attackers looking for a way into lucrative systems. While new flaws found in Active Directory and the MOVEit file transfer …

Enterprise Security Essentials | Top 12 Most Routinely Exploited Vulnerabilities Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 31

The Good | High-Severity Flaws Patched in Firefox and Chrome Updates Browsers are our windows to the internet and due to both their ubiquity and the amount of information they collect, they are often prime targets for threat actors, so there’s good news for Firefox and Chrome users this week as new security patches have …

The Good, the Bad and the Ugly in Cybersecurity – Week 31 Read More »

AD Security Assessments and Attack Paths | How to Achieve Greater Visibility

Active Directory (AD) has become a primary target for attackers launching identity-centric attacks. Fortunately, there are several tools available to help enterprise security teams get clearer visibility into their Active Directory instances and address any vulnerabilities they uncover. One popular tool in use by analysts is Attack Path graphs, which can be used to show …

AD Security Assessments and Attack Paths | How to Achieve Greater Visibility Read More »

Mac Admins | Why Apple’s Silent Approach to Endpoint Security Should be a Wake-Up Call

If there’s one thing that everyone should be able to agree on about Apple, it is that the company really does think different when it comes to the design of its products, and this is nowhere more obvious than in the company’s approach to endpoint security. Users will find no Defender-like security center built into …

Mac Admins | Why Apple’s Silent Approach to Endpoint Security Should be a Wake-Up Call Read More »

The Nightmare Of Destructive Malware | From Wiper To SwiftSlicer

In partnership with vx-underground, SentinelOne recently ran its first Malware Research Challenge, in which we asked researchers across the cybersecurity community to submit their research to showcase their talents and bring their insights to a wider audience. In today’s guest post, researcher Natacha Bakir (Senthorus/Cefcys) digs into the destructive world of wipers: a special class …

The Nightmare Of Destructive Malware | From Wiper To SwiftSlicer Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 30

The Good | SEC Says Cyber Incidents Must Be Disclosed Within 4 Days The Securities and Exchange Commission has announced that it is adopting new rules that will require companies to disclose cyberattacks within four days. In a press release on Wednesday, the SEC said the new rules require “registrants to disclose material cybersecurity incidents …

The Good, the Bad and the Ugly in Cybersecurity – Week 30 Read More »