Network Security

Understanding the Evolution of Modern Business Email Compromise Attacks

Business email compromise (BEC) exploits the main common denominator found across every technology, tool, and process – the humans that interact with it. Taking advantage of human decision making habits and emotions, BEC has remained one of the most lucrative attack methods seen in today’s cyber threat landscape. This May, the FBI issued a public …

Understanding the Evolution of Modern Business Email Compromise Attacks Read More »

Announcing AI-Powered Threat Detection for NetApp

SentinelOne is pleased to announce general availability (GA) of Threat Detection for NetApp. Part of the new Singularity Cloud Data Security product line, this novel security solution applies SentinelOne’s proprietary AI models to scan files and detect malware stored on NetApp arrays, stopping its spread before it begins. Supported as part of the NetApp Partner …

Announcing AI-Powered Threat Detection for NetApp Read More »

Apple Crimeware | Massive Rust Infostealer Campaign Aiming for macOS Sonoma Ahead of Public Release

Earlier this month, security researcher iamdeadlyz reported on multiple fake blockchain games being used to infect both Windows and macOS targets with infostealers, capable of emptying crypto wallets and stealing stored password and browser data. In the case of macOS, the infostealer turned out to be a new malware written in Rust, dubbed “realst”. Building …

Apple Crimeware | Massive Rust Infostealer Campaign Aiming for macOS Sonoma Ahead of Public Release Read More »

Deconstructing PowerShell Obfuscation in Malspam Campaigns

In partnership with vx-underground, SentinelOne recently ran its first Malware Research Challenge, in which we asked researchers across the cybersecurity community to submit their research to showcase their talents and bring their insights to a wider audience. In today’s post, researcher Ankith Bharadwaj (@bherund) delves into the murkly world of Windows PowerShell obfuscation techniques, widely …

Deconstructing PowerShell Obfuscation in Malspam Campaigns Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 29

The Good | The White House Unveils Cybersecure Labeling Program for IoT Devices A U.S.-wide cybersecurity certification and labeling program launched this week to guide consumers in choosing tech products that are less vulnerable to attack. The latest from the Biden-Harris administration, the “U.S. Cyber Trust Mark” is expected to enhance cybersecurity measures across popular …

The Good, the Bad and the Ugly in Cybersecurity – Week 29 Read More »

Clouds In the Attack Horizon | How Identity & Access Controls Fortifies Hybrid Environments

Modern enterprises have rapidly adopted hybrid cloud environments to harness the benefits of both on-prem infrastructure and public cloud services. With higher rates of adoption and nearly half of all breaches occurring in the cloud, the question of how to secure this growing hybrid cloud landscape has become a top priority for business leaders. One …

Clouds In the Attack Horizon | How Identity & Access Controls Fortifies Hybrid Environments Read More »