Blog

SmoothOperator | Ongoing Campaign Trojanizes 3CXDesktopApp in Supply Chain Attack

By Juan Andres Guerrero-Saade, Asaf Gilboa, David Acs, James Haughom, Phil Stokes & SentinelLabs Executive Summary As of Mar 22, 2023 SentinelOne began to see a spike in behavioral detections of the 3CXDesktopApp, a popular voice and video conferencing software product categorized as a Private Automatic Branch Exchange (PABX) platform. Behavioral detections prevented these trojanized

SmoothOperator | Ongoing Campaign Trojanizes 3CXDesktopApp in Supply Chain Attack Read More »

OpenSSL 3 Critical Vulnerability | What Do Organizations Need To Do Now?

Last week, the OpenSSL project team announced the release of OpenSSL version 3.0.7, which was made available on Tuesday, November 1st. The update is a security fix for two vulnerabilities in OpenSSL 3.0.x, and developers and organizations are being urged to ensure that they patch any instances of OpenSSL 3 in their software stack as

OpenSSL 3 Critical Vulnerability | What Do Organizations Need To Do Now? Read More »

JokerSpy | Unknown Adversary Targeting Organizations with Multi-Stage macOS Malware

Recent reports from researchers at BitDefender and Elastic have exposed an active adversary deploying novel spyware, cross-platform backdoors and an open-source reconnaissance tool to compromise organizations with macOS devices in their fleets. Although the number of known victims at this time is small, the nature of the tooling suggests that the threat actors have likely

JokerSpy | Unknown Adversary Targeting Organizations with Multi-Stage macOS Malware Read More »

Analyzing Attack Opportunities Against Information Security Practitioners

In partnership with vx-underground, SentinelOne recently ran its first Malware Research Challenge, in which we asked researchers across the cybersecurity community to submit previously unpublished work to showcase their talents and bring their insights to a wider audience. Today’s post is the second in a series highlighting the best entries. Jared Stroud (@DLL_Cool_J / Arch

Analyzing Attack Opportunities Against Information Security Practitioners Read More »

Cybersecurity In The Fast Lane | Why Speed Is Key In Incident Response & Mitigation

Threat actors are constantly evolving, consistently developing the tools, tactics, and procedures (TTPs) they use in attacks. In today’s threat landscape, enterprises of all sizes and industries find themselves pitted against professional cybercriminal gangs, advanced persistent threat (APT) groups, and even nation-state actors – all of whom are leveraging faster attack methods than ever before.

Cybersecurity In The Fast Lane | Why Speed Is Key In Incident Response & Mitigation Read More »

Neo_Net | The Kingpin of Spanish eCrime

In partnership with vx-underground, SentinelOne recently ran its first Malware Research Challenge, in which we asked researchers across the cybersecurity community to submit previously unpublished work to showcase their talents and bring their insights to a wider audience. Today’s post marks the start of a series highlighting the best entries, beginning with the winner from

Neo_Net | The Kingpin of Spanish eCrime Read More »