Network Security

Understanding Cloud Workload Protection (CWP) In Under 10 Minutes

In tandem with evolving business landscapes, cloud computing has emerged as a transformative force. The cloud’s ability to store, process, and deliver mass amounts of data and applications has made it the backbone of many modern businesses. Thanks to the cloud, many organizations have revolutionized the way they interact with information. Clouds offer scalability, flexibility,

Understanding Cloud Workload Protection (CWP) In Under 10 Minutes Read More »

S Ventures Invests in TileDB to Bring Simplicity and Performance to Complex Data Platforms

It’s not everyday that an idea emerges from academia with the potential to disrupt existing approaches and technologies. That’s why S Ventures is excited about our recent investment in TileDB, a universal data platform that unifies all types of data (and associated code) along with the complex infrastructure surrounding that data into a single solution.

S Ventures Invests in TileDB to Bring Simplicity and Performance to Complex Data Platforms Read More »

Threat Actors Actively Exploiting Progress WS_FTP via Multiple Attack Chains

Starting on September 30, 2023, SentinelOne has observed actors exploiting the recently disclosed flaws in Progress’ WS_FTP against Windows servers running a vulnerable version of the software. The two highest severity vulnerabilities–CVE-2023-40044 and CVE-2023-42657–were assigned a CVSS score of 10 and 9.9, respectively. We observed at least three types of multi-stage attack chains, which begin

Threat Actors Actively Exploiting Progress WS_FTP via Multiple Attack Chains Read More »

LostTrust Ransomware | Latest Multi-Extortion Threat Shares Traits with SFile and Mindware

The LostTrust ransomware operation is a new multi-extortion threat that emerged in September 2023. Our analysis of LostTrust malware payloads indicates that the family is an evolution of SFile and Mindware, and that all three follow similar operations and tradecraft to MetaEncryptor. Similarities between the LostTrust leaks sites and the earlier MetaEncryptor leaks sites are

LostTrust Ransomware | Latest Multi-Extortion Threat Shares Traits with SFile and Mindware Read More »

Beyond the WebP Flaw | An In-depth Look at 2023’s Browser Security Challenges

This week, Firefox users were urged to apply Mozilla’s latest updates against a critical flaw that could allow attackers to take control of affected systems. It follows hard on the heels of similar updates for Microsoft Edge, Google Chrome, and Apple’s Safari browser. All have been heavily impacted by an actively exploited vulnerability in the

Beyond the WebP Flaw | An In-depth Look at 2023’s Browser Security Challenges Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 39

The Good | CISA Launches Public Cyber Hygiene Campaign This week, CISA launched “Secure Our World”,  a new campaign aimed at improving the digital security of all by promoting awareness of cyber hygiene. As part of its wider Cybersecurity Awareness Program, the agency kicked off the campaign on Tuesday with a PSA promoting simple ways

The Good, the Bad and the Ugly in Cybersecurity – Week 39 Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 38

The Good | New Working Group to Focus Efforts on Threats in Undermonitored Regions This week at the annual LABScon cybersecurity event, SentinelLabs launched a concerted effort against state-aligned cyber activities in areas like Africa and Latin America – regions that often receive less representation within the threat intelligence industry. Researcher Tom Hegel unveiled a

The Good, the Bad and the Ugly in Cybersecurity – Week 38 Read More »