Network Security

Day 2 of Black Hat USA 2023 | Exploring The Power of a Threat Intel & AI-Driven Future

What a few days it was at this year’s BlackHat cyber event in sunny Las Vegas! The stunning SentinelOne booth welcomed thousands of visitors who came to learn about PurpleAI, our newly launched Ranger Insights console, and all the ways the Singularity platform helps organizations protect their endpoints, secure their cloud, and unify their data. […]

Day 2 of Black Hat USA 2023 | Exploring The Power of a Threat Intel & AI-Driven Future Read More »

Day 1 of Black Hat USA 2023 | Generative AI, Automation & The Security Landscape of Tomorrow

SentinelOne has landed in Vegas for this year’s Black Hat security conference! Each year, Black Hat invites security gurus, researchers, hackers, and cyber enthusiasts from around the world to join in on two-days of keynotes by industry leaders as well as cutting-edge presentations and exclusive tech demos. We’ll be sure to keep you in the

Day 1 of Black Hat USA 2023 | Generative AI, Automation & The Security Landscape of Tomorrow Read More »

Enterprise Security Essentials | Top 12 Most Routinely Exploited Vulnerabilities

Leveraging known bugs and unpatched exploits continue to be an unyielding strategy for threat actors. Ranging from security bypasses and credential exposure to remote code execution, software vulnerabilities remain tools of the trade for cyber attackers looking for a way into lucrative systems. While new flaws found in Active Directory and the MOVEit file transfer

Enterprise Security Essentials | Top 12 Most Routinely Exploited Vulnerabilities Read More »

AD Security Assessments and Attack Paths | How to Achieve Greater Visibility

Active Directory (AD) has become a primary target for attackers launching identity-centric attacks. Fortunately, there are several tools available to help enterprise security teams get clearer visibility into their Active Directory instances and address any vulnerabilities they uncover. One popular tool in use by analysts is Attack Path graphs, which can be used to show

AD Security Assessments and Attack Paths | How to Achieve Greater Visibility Read More »

Deconstructing PowerShell Obfuscation in Malspam Campaigns

In partnership with vx-underground, SentinelOne recently ran its first Malware Research Challenge, in which we asked researchers across the cybersecurity community to submit their research to showcase their talents and bring their insights to a wider audience. In today’s post, researcher Ankith Bharadwaj (@bherund) delves into the murkly world of Windows PowerShell obfuscation techniques, widely

Deconstructing PowerShell Obfuscation in Malspam Campaigns Read More »