Network Security

SmoothOperator | Ongoing Campaign Trojanizes 3CXDesktopApp in Supply Chain Attack

By Juan Andres Guerrero-Saade, Asaf Gilboa, David Acs, James Haughom, Phil Stokes & SentinelLabs Executive Summary As of Mar 22, 2023 SentinelOne began to see a spike in behavioral detections of the 3CXDesktopApp, a popular voice and video conferencing software product categorized as a Private Automatic Branch Exchange (PABX) platform. Behavioral detections prevented these trojanized

SmoothOperator | Ongoing Campaign Trojanizes 3CXDesktopApp in Supply Chain Attack Read More »

OpenSSL 3 Critical Vulnerability | What Do Organizations Need To Do Now?

Last week, the OpenSSL project team announced the release of OpenSSL version 3.0.7, which was made available on Tuesday, November 1st. The update is a security fix for two vulnerabilities in OpenSSL 3.0.x, and developers and organizations are being urged to ensure that they patch any instances of OpenSSL 3 in their software stack as

OpenSSL 3 Critical Vulnerability | What Do Organizations Need To Do Now? Read More »

Are You Making One of These 8 Cloud Security Mistakes?

Though mass adoption has driven an increased awareness and need for cloud security, many businesses continue to make common cloud-related mistakes along their journey. Increased dependency on the cloud has presented challenges for enterprises on two fronts. Externally, threat actors continue to sharpen their focus, developing attacks targeting organizations’ cloud footprint. From an internal standpoint,

Are You Making One of These 8 Cloud Security Mistakes? Read More »

Analyzing Attack Opportunities Against Information Security Practitioners

In partnership with vx-underground, SentinelOne recently ran its first Malware Research Challenge, in which we asked researchers across the cybersecurity community to submit previously unpublished work to showcase their talents and bring their insights to a wider audience. Today’s post is the second in a series highlighting the best entries. Jared Stroud (@DLL_Cool_J / Arch

Analyzing Attack Opportunities Against Information Security Practitioners Read More »