Blog

Looking Within | Strategies for Detecting and Mitigating Insider Threats

Over the past decade, the digital landscape has undergone a rapid transformation, reshaping the way businesses operate and interact with data. With this paradigm shift, the nature and scope of insider threats have also evolved significantly. As cloud adoption rates and reliance on third-party vendors rise, this has widened the attack surface for malicious insiders. …

Looking Within | Strategies for Detecting and Mitigating Insider Threats Read More »

Are You Making One of These 8 Cloud Security Mistakes?

Though mass adoption has driven an increased awareness and need for cloud security, many businesses continue to make common cloud-related mistakes along their journey. Increased dependency on the cloud has presented challenges for enterprises on two fronts. Externally, threat actors continue to sharpen their focus, developing attacks targeting organizations’ cloud footprint. From an internal standpoint, …

Are You Making One of These 8 Cloud Security Mistakes? Read More »

Getting More From Cloud | How to Maximize Business Value Through CloudOps Services

With more businesses relying on cloud computing to streamline operations and improve scalability, enterprise leaders are adopting a cloud-first approach, combining network, performance, security, endpoint management, and support all through cloud operations, or CloudOps. CloudOps combines both IT processes and DevOps principles to ensure the smooth operation, maintenance, and optimization of a cloud-based infrastructure and …

Getting More From Cloud | How to Maximize Business Value Through CloudOps Services Read More »

What It Takes to be a Top Gun | GenAI & Cybersecurity

We believe that generative AI has the potential to generate massive value and disrupt existing industries and applications. We are now witnessing generative AI accomplish things on a daily basis that just a short time ago did not seem possible. Generative AI has a meaningful role to play in cybersecurity, both for the good guys …

What It Takes to be a Top Gun | GenAI & Cybersecurity Read More »

Analyzing Attack Opportunities Against Information Security Practitioners

In partnership with vx-underground, SentinelOne recently ran its first Malware Research Challenge, in which we asked researchers across the cybersecurity community to submit previously unpublished work to showcase their talents and bring their insights to a wider audience. Today’s post is the second in a series highlighting the best entries. Jared Stroud (@DLL_Cool_J / Arch …

Analyzing Attack Opportunities Against Information Security Practitioners Read More »

Cybersecurity In The Fast Lane | Why Speed Is Key In Incident Response & Mitigation

Threat actors are constantly evolving, consistently developing the tools, tactics, and procedures (TTPs) they use in attacks. In today’s threat landscape, enterprises of all sizes and industries find themselves pitted against professional cybercriminal gangs, advanced persistent threat (APT) groups, and even nation-state actors – all of whom are leveraging faster attack methods than ever before. …

Cybersecurity In The Fast Lane | Why Speed Is Key In Incident Response & Mitigation Read More »

BlueNoroff | How DPRK’s macOS RustBucket Seeks to Evade Analysis and Detection

Back in April, researchers at JAMF detailed a sophisticated APT campaign targeting macOS users with multi-stage malware that culminated in a Rust backdoor capable of downloading and executing further malware on infected devices. ‘RustBucket’, as they labeled it, was attributed with strong confidence to the BlueNoroff APT, generally assumed to be a subsidiary of the …

BlueNoroff | How DPRK’s macOS RustBucket Seeks to Evade Analysis and Detection Read More »