Network Security

The New Frontline of Geopolitics | Understanding the Rise of State-Sponsored Cyber Attacks

The rise of nation-state cyber attacks has become a defining feature of modern geopolitics. With blurred lines between advanced persistent threats (APTs) and cybercrime, understanding this complex landscape has become a critical element in building a strong cybersecurity strategy. According to recent reports on the rise of state-sponsored cyber attacks, nation-state actors targeting critical infrastructures …

The New Frontline of Geopolitics | Understanding the Rise of State-Sponsored Cyber Attacks Read More »

Announcing Threat Detection for Amazon S3 | AI-Powered Data Protection

SentinelOne recently announced the launch of the new Singularity Cloud Data Security product line to help customers gain visibility and provide protection for their cloud data, storage, downstream applications, and users from risks associated with unscanned files. Threat Protection for NetApp provides protection for NetApp arrays, and Threat Detection for Amazon S3, which will be …

Announcing Threat Detection for Amazon S3 | AI-Powered Data Protection Read More »

CVE-2021-44228: Staying Secure – Apache Log4j Vulnerability

Executive Summary A new critical remote code execution vulnerability in Apache Log4j2, a Java-based logging tool, is being tracked as CVE-2021-44228. Further vulnerabilities in the Log4j library, including CVE-2021-44832 and CVE-2021-45046, have since come to light, as detailed here. Major services and applications globally are impacted by these vulnerabilities due to the prevalence of Log4j2’s …

CVE-2021-44228: Staying Secure – Apache Log4j Vulnerability Read More »

Peeking into CVE-2021-40444 | MS Office Zero-Day Vulnerability Exploited in the Wild

Microsoft Office has long been a common attack vector, with abuse of its macro functionality a firm favorite of phishing and malspam attacks. These typically attempt to infect users through maliciously crafted Word or Excel files received as an attachment or as a download link via email. Macro-based attacks, however, require an extra social engineering …

Peeking into CVE-2021-40444 | MS Office Zero-Day Vulnerability Exploited in the Wild Read More »

HiveNightmare | Protecting Windows 10 Security Account Manager Against CVE-2021-36934

It has been a tough few weeks for many enterprise security teams fighting a series of severe bugs in Microsoft Windows 10. Shortly after being ‘all hands on deck’ dealing with the remote code execution (RCE) vulnerability dubbed PrintNightmare, IT admins and security teams were plunged into another unexpected crisis thanks to the emergence of …

HiveNightmare | Protecting Windows 10 Security Account Manager Against CVE-2021-36934 Read More »

Log4j One Month On | Crimeware and Exploitation Roundup

It has been 31 days since the initial public disclosure of a critical remote code execution (RCE) vulnerability in the Apache Log4j logging library that upended enterprise security at the close of 2021. In that time, since the initial CVE-2021-44228 (critical), we’ve already seen five more related CVEs CVE-2021-45046 (critical) CVE-2021-4104 (high) CVE-2021-42550 (moderate) CVE-2021-45105 …

Log4j One Month On | Crimeware and Exploitation Roundup Read More »

Understanding XDR | A Guided Approach for Enterprise Leaders

Cyber adversaries operate with a level of finesse and precision that can catch organizations off guard. In seconds, they can lure unsuspecting employees or partners with malicious files, exploit existing vulnerabilities to breach a network, and start moving laterally within a system to up their credentials. The impact of ransomware attacks extends beyond mere disruption; …

Understanding XDR | A Guided Approach for Enterprise Leaders Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 32

The Good | White House Launches AI-Centric Cybersecurity Contest to Protect US Entities The Biden-Harris administration this week announced a new hacking challenge with the purpose of using artificial intelligence (AI) to protect critical US infrastructure from growing cybersecurity threats. In collaboration with tech companies such as OpenAI and Anthropic who are making their technology …

The Good, the Bad and the Ugly in Cybersecurity – Week 32 Read More »

Day 2 of Black Hat USA 2023 | Exploring The Power of a Threat Intel & AI-Driven Future

What a few days it was at this year’s BlackHat cyber event in sunny Las Vegas! The stunning SentinelOne booth welcomed thousands of visitors who came to learn about PurpleAI, our newly launched Ranger Insights console, and all the ways the Singularity platform helps organizations protect their endpoints, secure their cloud, and unify their data. …

Day 2 of Black Hat USA 2023 | Exploring The Power of a Threat Intel & AI-Driven Future Read More »