Blog

Announcing Threat Detection for Amazon S3 | AI-Powered Data Protection

SentinelOne recently announced the launch of the new Singularity Cloud Data Security product line to help customers gain visibility and provide protection for their cloud data, storage, downstream applications, and users from risks associated with unscanned files. Threat Protection for NetApp provides protection for NetApp arrays, and Threat Detection for Amazon S3, which will be […]

Announcing Threat Detection for Amazon S3 | AI-Powered Data Protection Read More »

CVE-2021-44228: Staying Secure – Apache Log4j Vulnerability

Executive Summary A new critical remote code execution vulnerability in Apache Log4j2, a Java-based logging tool, is being tracked as CVE-2021-44228. Further vulnerabilities in the Log4j library, including CVE-2021-44832 and CVE-2021-45046, have since come to light, as detailed here. Major services and applications globally are impacted by these vulnerabilities due to the prevalence of Log4j2’s

CVE-2021-44228: Staying Secure – Apache Log4j Vulnerability Read More »

HiveNightmare | Protecting Windows 10 Security Account Manager Against CVE-2021-36934

It has been a tough few weeks for many enterprise security teams fighting a series of severe bugs in Microsoft Windows 10. Shortly after being ‘all hands on deck’ dealing with the remote code execution (RCE) vulnerability dubbed PrintNightmare, IT admins and security teams were plunged into another unexpected crisis thanks to the emergence of

HiveNightmare | Protecting Windows 10 Security Account Manager Against CVE-2021-36934 Read More »

Log4j One Month On | Crimeware and Exploitation Roundup

It has been 31 days since the initial public disclosure of a critical remote code execution (RCE) vulnerability in the Apache Log4j logging library that upended enterprise security at the close of 2021. In that time, since the initial CVE-2021-44228 (critical), we’ve already seen five more related CVEs CVE-2021-45046 (critical) CVE-2021-4104 (high) CVE-2021-42550 (moderate) CVE-2021-45105

Log4j One Month On | Crimeware and Exploitation Roundup Read More »

Understanding XDR | A Guided Approach for Enterprise Leaders

Cyber adversaries operate with a level of finesse and precision that can catch organizations off guard. In seconds, they can lure unsuspecting employees or partners with malicious files, exploit existing vulnerabilities to breach a network, and start moving laterally within a system to up their credentials. The impact of ransomware attacks extends beyond mere disruption;

Understanding XDR | A Guided Approach for Enterprise Leaders Read More »

Day 2 of Black Hat USA 2023 | Exploring The Power of a Threat Intel & AI-Driven Future

What a few days it was at this year’s BlackHat cyber event in sunny Las Vegas! The stunning SentinelOne booth welcomed thousands of visitors who came to learn about PurpleAI, our newly launched Ranger Insights console, and all the ways the Singularity platform helps organizations protect their endpoints, secure their cloud, and unify their data.

Day 2 of Black Hat USA 2023 | Exploring The Power of a Threat Intel & AI-Driven Future Read More »

Day 1 of Black Hat USA 2023 | Generative AI, Automation & The Security Landscape of Tomorrow

SentinelOne has landed in Vegas for this year’s Black Hat security conference! Each year, Black Hat invites security gurus, researchers, hackers, and cyber enthusiasts from around the world to join in on two-days of keynotes by industry leaders as well as cutting-edge presentations and exclusive tech demos. We’ll be sure to keep you in the

Day 1 of Black Hat USA 2023 | Generative AI, Automation & The Security Landscape of Tomorrow Read More »

Enterprise Security Essentials | Top 12 Most Routinely Exploited Vulnerabilities

Leveraging known bugs and unpatched exploits continue to be an unyielding strategy for threat actors. Ranging from security bypasses and credential exposure to remote code execution, software vulnerabilities remain tools of the trade for cyber attackers looking for a way into lucrative systems. While new flaws found in Active Directory and the MOVEit file transfer

Enterprise Security Essentials | Top 12 Most Routinely Exploited Vulnerabilities Read More »