Network Security

The Good, the Bad and the Ugly in Cybersecurity – Week 16

The Good | CVE & CWE Programs Receive Funding from CISA to Ensure Continued Operation Up until a few days ago, the global cybersecurity community was bracing for widespread disruption – U.S. government funding for the Common Vulnerabilities and Exposures (CVE) and Common Weakness Enumeration (CWE) programs was set to expire on April 16, 2025. …

The Good, the Bad and the Ugly in Cybersecurity – Week 16 Read More »

PinnacleOne ExecBrief | Economists on AI & Workplace Productivity

There is an oft-referenced quote in economics about the impact of computing on the workplace in the 1980s. Economist Robert Solow remarked in 1987 that “You can see the computer era everywhere but in the productivity statistics.” In the years that followed Solow’s observation, workplace productivity increased, but not at levels anticipated by the white-hot …

PinnacleOne ExecBrief | Economists on AI & Workplace Productivity Read More »

Avoiding MCP Mania | How to Secure the Next Frontier of AI

Artificial Intelligence (AI) is evolving rapidly and Large Language Models (LLMs) are at the heart of this transformation. As these models become more integrated with external tools and real-time data though, new security challenges emerge. Enter: Model Context Protocol (MCP), a framework designed to bridge LLMs with external data sources and tools. In this blog …

Avoiding MCP Mania | How to Secure the Next Frontier of AI Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 15

The Good | Police Detain Five SmokeLoader Malware Customers in New Phase of Operation Endgame Law enforcement is intensifying its efforts to target the customers behind major malware loaders like IcedID, Bumblebee, Pikabot, TrickBot, SystemBC, and SmokeLoader – all of which were dismantled last year as part of Operation Endgame. This week, Europol confirmed that …

The Good, the Bad and the Ugly in Cybersecurity – Week 15 Read More »

The AI Inflection Point | How Agentic & GenAI Are Reshaping Security Operations

The rapid adoption of Generative AI (GenAI) and the emergence of Agentic AI has unlocked new opportunities for security teams to better stay ahead of attacks. In security operations centers worldwide, organizations are rapidly adopting AI tools to augment human analysts, improve efficiency, and lay the foundation for a more autonomous SOC. Across the industry, …

The AI Inflection Point | How Agentic & GenAI Are Reshaping Security Operations Read More »

Re-Assessing Risk | Subdomain Takeovers As Supply Chain Attacks

Cybersecurity is defined by constant change. Whether it’s zero-days that disrupt operations and demand our immediate attention (e.g., tj-actions, XZ utility, and log4j), or the constant stream of updates, patches, and of course, alerts, the cyber landscape is in perpetual motion As the numbers of disclosed vulnerabilities grow yearly and the likelihood of remediating them …

Re-Assessing Risk | Subdomain Takeovers As Supply Chain Attacks Read More »

An Official Statement in Response to the April 9, 2025 Executive Order

The following is SentinelOne’s official statement in response to the Executive Order (EO) announced on April 9th: We are a cybersecurity company – our mission is to defend customers, enterprises, and governments against cyber threats by leveraging the most advanced Artificial Intelligence. We view the White House as a crucial collaborator on that mission, and …

An Official Statement in Response to the April 9, 2025 Executive Order Read More »

IngressNightmare | Critical Unauthenticated RCE Vulnerabilities in Kubernetes Ingress NGINX

As more organizations adopt containerization, Kubernetes adoption is at an all-time high. A key component to any Kubernetes cluster is allowing and managing external traffic to the services organizations are building. Enter, Ingress. As a powerful component and set of resources that expose services to the outside world, Ingress’ power and complexity lends itself to …

IngressNightmare | Critical Unauthenticated RCE Vulnerabilities in Kubernetes Ingress NGINX Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 14

The Good | DoJ Seize $8.2 Million in Cryptocurrency Linked to Romance Baiting Schemes The DoJ has seized over $8.2 million in USDT (Tether) cryptocurrency, all stolen through ‘romance baiting’ scams, formerly known as ‘pig butchering’. Victims are manipulated into making investments on fake websites or apps after being promised substantial returns. They are then …

The Good, the Bad and the Ugly in Cybersecurity – Week 14 Read More »