Network Security

Chained Detections | Revolutionizing Adaptive Threat Hunting

Chained detections is a new threat hunting paradigm aligned with the strategy of chaining interesting events to identify behavior patterns and augment threat attribution. Much like SentinelOne’s Storyline technology, which connects events from various sources to create a narrative of an attack, human threat hunters harness these capabilities to comprehensively grasp the potential impact of […]

Chained Detections | Revolutionizing Adaptive Threat Hunting Read More »

Partnering for Success | A Q&A with Brian Lanigan, SVP of Partner Ecosystem, SentinelOne

As a partner-driven organization, SentinelOne recognizes the critical role that partners play in securing our digital world. Partners are instrumental in helping customers understand how to break through the noise and recommending the best solutions to help solve their toughest security challenges, and businesses are increasingly turning to managed security to elevate protection, address cybersecurity

Partnering for Success | A Q&A with Brian Lanigan, SVP of Partner Ecosystem, SentinelOne Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 20

The Good | International Law Enforcement Charge Crypto Criminals & Take Down a New Iteration of BreachForums In the past week, law enforcement agencies took down cryptocurrency thieves responsible for a multi-million dollar theft from the Ethereum blockchain, and seized a second iteration of the notorious hacking platform, BreachForums. The DoJ has unsealed an indictment

The Good, the Bad and the Ugly in Cybersecurity – Week 20 Read More »

Unify the Analyst Experience with Singularity Operations Center

On April 26, 2024, SentinelOne marked a significant milestone in security management with the launch of the Singularity Operations Center, the new unified security console. This major update to the Singularity Platform is now generally available (GA) to all cloud-native customers, representing a pivotal shift to a more integrated and efficient analyst experience for security

Unify the Analyst Experience with Singularity Operations Center Read More »

Cloud Native Security | Prioritize Better, Respond Faster, with Verified Exploit Paths™

This week, SentinelOne launched Singularity Cloud Native Security (CNS), our agentless Cloud Native Application Protection Platform (CNAPP) uniquely designed to assess cloud environments through the eyes of a threat actor. As attackers increasingly target cloud environments, SentinelOne’s latest solution helps organizations better defend against these attacks. CNS simulates attack methods to verify exploit pathways, so-called

Cloud Native Security | Prioritize Better, Respond Faster, with Verified Exploit Paths™ Read More »

macOS Cuckoo Stealer | Ensuring Detection and Defense as New Samples Rapidly Emerge

Infostealers targeting macOS devices have been on the rise for well over a year now, with variants such as Atomic Stealer (Amos), RealStealer (Realst), MetaStealer and others widely distributed in the wild through malicious websites, cracked applications and trojan installers. These past few weeks have seen a new macOS malware family appear that researchers have

macOS Cuckoo Stealer | Ensuring Detection and Defense as New Samples Rapidly Emerge Read More »

Think Like an Attacker with SentinelOne’s Cloud Native Security (CNS)

SentinelOne is very excited to announce the general availability (GA) of Singularity Cloud Native Security! Cloud Native Security (CNS), our agentless Cloud Native Application Protection Platform (CNAPP) based on our recent PingSafe acquisition, is now integrated into the Singularity Platform and available to new and existing customers via our unified security console, the Singularity Operations

Think Like an Attacker with SentinelOne’s Cloud Native Security (CNS) Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 18

The Good | Law Enforcement Set New IoT Device Protections, Charge Ex-NSA Spy, and Sentence REvil Affiliate to Prison Global law enforcement agencies made significant strides this week, improving the minimum safety standards to protect tech consumers and officially sentencing two major cybersecurity criminals. Tech manufacturers in the U.K. are now legally required to protect

The Good, the Bad and the Ugly in Cybersecurity – Week 18 Read More »

macOS Adload | Prolific Adware Pivots Just Days After Apple’s XProtect Clampdown 

It’s been little more than a week since Apple rolled out an unprecedented 74 new rules to its XProtect malware signature list in version 2192. A further 10 rules were appended in version 2193 on April 30th. Cupertino’s security team were clearly hoping that a concerted effort would serve to disrupt prolific adware distributor Adload’s

macOS Adload | Prolific Adware Pivots Just Days After Apple’s XProtect Clampdown  Read More »

Insuring Cyber Health | Chubb’s Insight via SentinelOne Telemetry

In an expanding collaboration between Chubb, one of the largest publicly traded property and casualty insurance companies, and SentinelOne, a cybersecurity leader, clients of SentinelOne who are also Chubb policyholders can now share their enterprise cyber health assessment data with Chubb. This facilitates a more efficient and precise underwriting process. With the increasing emphasis on

Insuring Cyber Health | Chubb’s Insight via SentinelOne Telemetry Read More »