Blog

The AI Inflection Point | How Agentic & GenAI Are Reshaping Security Operations

The rapid adoption of Generative AI (GenAI) and the emergence of Agentic AI has unlocked new opportunities for security teams to better stay ahead of attacks. In security operations centers worldwide, organizations are rapidly adopting AI tools to augment human analysts, improve efficiency, and lay the foundation for a more autonomous SOC. Across the industry, […]

The AI Inflection Point | How Agentic & GenAI Are Reshaping Security Operations Read More »

Re-Assessing Risk | Subdomain Takeovers As Supply Chain Attacks

Cybersecurity is defined by constant change. Whether it’s zero-days that disrupt operations and demand our immediate attention (e.g., tj-actions, XZ utility, and log4j), or the constant stream of updates, patches, and of course, alerts, the cyber landscape is in perpetual motion As the numbers of disclosed vulnerabilities grow yearly and the likelihood of remediating them

Re-Assessing Risk | Subdomain Takeovers As Supply Chain Attacks Read More »

An Official Statement in Response to the April 9, 2025 Executive Order

The following is SentinelOne’s official statement in response to the Executive Order (EO) announced on April 9th: We are a cybersecurity company – our mission is to defend customers, enterprises, and governments against cyber threats by leveraging the most advanced Artificial Intelligence. We view the White House as a crucial collaborator on that mission, and

An Official Statement in Response to the April 9, 2025 Executive Order Read More »

Cyber Threats & SMBs | Chubb & SentinelOne Expedite Access to Cyber Insurance

In late 2024, Chubb, the largest US commercial cyber insurance provider, entered a partnership with SentinelOne to offer small and medium businesses (SMBs) – organizations with less than $100M in annual revenue – a streamlined means of securing affordable cyber insurance, loss mitigation, and incident response services. As part of the partnership, SentinelOne customers can

Cyber Threats & SMBs | Chubb & SentinelOne Expedite Access to Cyber Insurance Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 13

The Good | Interpol Cracks Down on 300 Cybercriminals Linked to African Cyber Scam Operations 306 suspects have been arrested in Operation Red Card, an international crackdown conducted between November 2024 and February 2025 on cybercrime networks operating across borders. The joint operation between Interpol and African law enforcement seized 1842 devices linked to mobile

The Good, the Bad and the Ugly in Cybersecurity – Week 13 Read More »

GPU Device Plugins | Unveiling Risks in Kubernetes Workloads

GPU device plugins in Kubernetes have become indispensable for artificial intelligence (AI) and machine learning (ML) workloads. They enable seamless integration of graphics processing unit (GPU) resources, accelerating computationally heavy tasks such as model training, real-time inference, and big-data processing. As organizations scale their AI and ML operations, these plugins simplify resource management while maximizing

GPU Device Plugins | Unveiling Risks in Kubernetes Workloads Read More »

ReaderUpdate Reforged | Melting Pot of macOS Malware Adds Go to Crystal, Nim and Rust Variants

ReaderUpdate is a macOS malware loader platform that, despite having been in the wild since at least 2020, has passed relatively unnoticed by many vendors and remains widely undetected. A report in 2023 observed that ReaderUpdate infections were contiguous with but distinct from WizardUpdate (aka UpdateAgent, Silver Toucan) infections and seen to deliver Genieo (aka

ReaderUpdate Reforged | Melting Pot of macOS Malware Adds Go to Crystal, Nim and Rust Variants Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 12

The Good | CISA Updates Its KEV Catalog, Reminding Users to Prioritize Patch Management CISA has added three newly exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, calling out the urgency of patching security flaws to keep organizations protected from active exploits. The first vulnerability, CVE-2025-1316 (critical severity), affects Edimax IC-7100 IP Cameras. This

The Good, the Bad and the Ugly in Cybersecurity – Week 12 Read More »