Network Security

PinnacleOne ExecBrief | Malicious Insider Threat to Strategic Enterprises

Last week, PinnacleOne examined China’s application of emerging AI tools to augment their rapidly improving cyber capabilities and emphasized the urgency for defenders to keep pace. This week, we focus on the recent arrest of a PRC national indicted for theft of Google AI IP and we identify lessons learned for firms to improve malicious […]

PinnacleOne ExecBrief | Malicious Insider Threat to Strategic Enterprises Read More »

Identity Security | How Best to Strengthen Enterprise Security

Identity-related attacks are one of the most common vectors of compromise in modern cyber attacks. In these attacks, threat actors work to steal identities, impersonating real users so they can move laterally and access resources on the network. Identities with greater access and admin-level privileges to valuable data are most likely to be stolen or

Identity Security | How Best to Strengthen Enterprise Security Read More »

Simplifying the Security Analyst Experience with Open Cybersecurity Schema Framework (OCSF)

In this blog, we dive into how the Open Cybersecurity Schema Framework (OCSF) improves the security analyst experience. By standardizing third party cybersecurity data through OCSF, SentinelOne enhances efficiency and effectiveness, enabling customers like Liberty Group to prioritize security operations over data acquisition challenges. This exploration offers insights into the real-world benefits and potential of

Simplifying the Security Analyst Experience with Open Cybersecurity Schema Framework (OCSF) Read More »

Kryptina RaaS | From Underground Commodity to Open Source Threat

One of the key drivers behind the explosion in ransomware attacks over the last five years and more has been the development and proliferation of the ransomware-as-a-service model, a means of providing cybercriminals with easy to use, low cost tools with which to undertake and manage ransomware campaigns. Developers benefit from a steady stream of

Kryptina RaaS | From Underground Commodity to Open Source Threat Read More »

Decrypting SentinelOne Cloud Detection | The STAR™ Rules Engine in Real-Time CWPP

In this the fifth installment of our Detection Engine blog series, we examine the STAR Rules Engine and its role as one of five detection engines which work together as part of our cloud workload protection platform (CWPP) to detect, block, and respond to runtime threats impacting cloud workloads. (The first, second, third, and fourth

Decrypting SentinelOne Cloud Detection | The STAR™ Rules Engine in Real-Time CWPP Read More »

Customer Guidance on Emerging AnyDesk Cybersecurity Incident

AnyDesk, a remote desktop software, has recently released confirmation of a cyberattack in which hackers were able to access the company’s production environment.  Anydesk stated that no authentication tokens were stolen during the attack, as these tokens only exist on the end user’s device and are associated with the device’s fingerprint. However, out of caution,

Customer Guidance on Emerging AnyDesk Cybersecurity Incident Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 5

The Good | Recent Cyber Operations Combat Insider Threats and Disrupt Sophisticated Malware In a series of cyber arrests and operations this week, law enforcement agencies around the world made strides in taking down cyber threats across different regions. In the U.S., three former Department of Homeland Security employees, including a former Acting Inspector General,

The Good, the Bad and the Ugly in Cybersecurity – Week 5 Read More »

Backdoor Activator Malware Running Rife Through Torrents of macOS Apps

Malware authors have long targeted the market for free, cracked apps available through torrent services: in recent years a variety of cryptominers, adware, browser hijackers and bundled software installers have all plied their warez this way, but a recent macOS malware first spotted by researchers at Kaspersky is currently running rampant through dozens of different

Backdoor Activator Malware Running Rife Through Torrents of macOS Apps Read More »