Network Security

Decrypting SentinelOne’s Detection | An In-depth Look at Our Real-Time CWPP Static AI Engine

Artificial intelligence (AI) is such a hot topic right now with everyone clamoring to say how their company is leveraging AI in all the new, flashy ways. Here at SentinelOne, we don’t do hype or hyperbole and AI is nothing new. We were founded in 2013 on the premise that AI could fundamentally transform cybersecurity […]

Decrypting SentinelOne’s Detection | An In-depth Look at Our Real-Time CWPP Static AI Engine Read More »

The Realm of Ethical Hacking | Red, Blue & Purple Teaming Explained

Businesses continue to digitize their critical infrastructures and operations, expanding their attack surface and exposure to various threat vectors. To combat this, leaders are recognizing the value of having in-house experts who can think like cybercriminals and help build a proactive stance against attackers. Considering new and constant developments in the cyber threat landscape, business

The Realm of Ethical Hacking | Red, Blue & Purple Teaming Explained Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 42

The Good | Ragnar Locker’s Tor & Leak Sites Taken Down In International Seizure Ragnar Locker took a serious blow this week when authorities seized the ransomware operation’s Tor negotiation and data leak sites. This is the latest takedown coordinated across over a dozen international authorities. Now, visitors to the once-infamous sites are greeted with

The Good, the Bad and the Ugly in Cybersecurity – Week 42 Read More »

Social Engineering Attacks | How to Recognize and Resist The Bait

While much of cyber news often revolves around novel malware strains and high-profile data breaches, one threat that often flies under the radar relies on human vulnerability rather than technical vulnerabilities: social engineering attacks. This type of attack exploits people’s most innate tendency to trust, comply, and share information. This is what makes these attacks

Social Engineering Attacks | How to Recognize and Resist The Bait Read More »

Oct 2023 Cybercrime Update | Disinformation, DDoS and Scams as Gangs Look to Exploit Turmoil

In this blog post, we delve into the notable trends that have been shaping the cyber landscape over the past month. With the conflict between Israel and Hamas dominating the news cycle, we look at how this is currently impacting cybersecurity, and provide updates on ransomware and other cybercrime activity to help security leaders stay

Oct 2023 Cybercrime Update | Disinformation, DDoS and Scams as Gangs Look to Exploit Turmoil Read More »

A Modern Approach to Adaptive Threat Hunting Methodologies

Threat hunting encompasses a range of techniques and approaches aimed at discovering anomalies, threats, and risks associated with attacker activities. In the early days, log review by diligent system administrators was how these anomalies were detected, usually after the fact. This evolved into more structured methodologies created by security experts that attempted to identify these

A Modern Approach to Adaptive Threat Hunting Methodologies Read More »

macOS Malware 2023 | A Deep Dive into Emerging Trends and Evolving Techniques

Last week saw Apple update XProtect to version 2173 with new rules for Atomic Stealer and Adload. As we have noted previously, Apple’s defenses for the Mac have been evolving of late, with increased attention on remediation and some prototype behavioral rules that appear to still be in testing mode. However, 2023 to date has

macOS Malware 2023 | A Deep Dive into Emerging Trends and Evolving Techniques Read More »