Blog

AD Security Assessments and Attack Paths | How to Achieve Greater Visibility

Active Directory (AD) has become a primary target for attackers launching identity-centric attacks. Fortunately, there are several tools available to help enterprise security teams get clearer visibility into their Active Directory instances and address any vulnerabilities they uncover. One popular tool in use by analysts is Attack Path graphs, which can be used to show

AD Security Assessments and Attack Paths | How to Achieve Greater Visibility Read More »

Deconstructing PowerShell Obfuscation in Malspam Campaigns

In partnership with vx-underground, SentinelOne recently ran its first Malware Research Challenge, in which we asked researchers across the cybersecurity community to submit their research to showcase their talents and bring their insights to a wider audience. In today’s post, researcher Ankith Bharadwaj (@bherund) delves into the murkly world of Windows PowerShell obfuscation techniques, widely

Deconstructing PowerShell Obfuscation in Malspam Campaigns Read More »

Clouds In the Attack Horizon | How Identity & Access Controls Fortifies Hybrid Environments

Modern enterprises have rapidly adopted hybrid cloud environments to harness the benefits of both on-prem infrastructure and public cloud services. With higher rates of adoption and nearly half of all breaches occurring in the cloud, the question of how to secure this growing hybrid cloud landscape has become a top priority for business leaders. One

Clouds In the Attack Horizon | How Identity & Access Controls Fortifies Hybrid Environments Read More »

Strengthening Cyber Defenses | A Guide to Enhancing Modern Tabletop Exercises

To combat a growing range of cyber threats, enterprise leaders and cybersecurity professionals often employ tabletop exercises as a valuable tool to enhance preparedness and response capabilities. Tabletop exercises simulate real-world cyber incidents in a controlled environment, allowing organizations to test their incident response plans, evaluate team coordination, and identify vulnerabilities. As the overall threat

Strengthening Cyber Defenses | A Guide to Enhancing Modern Tabletop Exercises Read More »