Network Security

The Good, the Bad and the Ugly in Cybersecurity – Week 45

The Good | Cloud Credential Thief Arrested & Cyber Operation Seizes 22,000 Malicious IP Addresses Alexander “Connor” Moucka, aka “Waifu” and “Judische”, was arrested this week by Canadian authorities for allegedly stealing data from hundreds of millions of people. These victims stem from over 165 organizations using services from Snowflake, a cloud storage company. Investigations …

The Good, the Bad and the Ugly in Cybersecurity – Week 45 Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 44

The Good | Police Seize Infostealer Malware Operations & Charge Suspected Administrator Executing “Operation Magnus”, Dutch National Police this week joined forces with international law enforcement groups to disrupt the network infrastructure for Redline and Meta infostealer malware. Considered popular tools on platforms like Telegram, Redline and Meta are commonly used by attackers to steal …

The Good, the Bad and the Ugly in Cybersecurity – Week 44 Read More »

Driving Advancement in Cybersecurity | Top 5 Takeaways from OneCon24

Since its founding, SentinelOne has been a global leader in how AI and machine learning can detect and protect against known and novel threats through autonomous response. This foundational DNA was a driver in the company’s early, market-defining use of generative AI to, not only simplify querying, but to analyze security data to speed response …

Driving Advancement in Cybersecurity | Top 5 Takeaways from OneCon24 Read More »

Climbing The Ladder | Kubernetes Privilege Escalation (Part 2)

In this blog post, we take the concepts from Climbing The Ladder | Kubernetes Privilege Escalation (Part 1), which examined privilege escalation in Kubernetes environments and the danger of system pods, and now take a deep dive by analyzing an explicit use case. Part 2 of this series explores how a chain of misconfigurations in …

Climbing The Ladder | Kubernetes Privilege Escalation (Part 2) Read More »

Safely Expanding the Frontiers of AI & LLMs | S Ventures’ Investment in Galileo

We’ve long recognized the transformative potential of AI in security and beyond. Since our founding, SentinelOne has harnessed the power of AI as a force of good – giving organizations the advantage of speed and automation to stop attacks and reduce risk. As the venture arm of SentinelOne, S Ventures’ AI strategy builds on that …

Safely Expanding the Frontiers of AI & LLMs | S Ventures’ Investment in Galileo Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 43

The Good | CISA Safety Proposal Set to Protect U.S. Data & Recovery Tool for Mallox Ransomware Published Following President Biden’s Executive Order 14117, signed earlier in the year, CISA has proposed new security measures to prevent adversary nations from accessing sensitive personal and government-related data across the U.S. The proposal is aimed at organizations …

The Good, the Bad and the Ugly in Cybersecurity – Week 43 Read More »

Climbing The Ladder | Kubernetes Privilege Escalation (Part 1)

Kubernetes (K8s) has become an integral part of cloud-native environments, offering powerful container orchestration capabilities that enable organizations to deploy, manage, and scale applications efficiently. However, as Kubernetes adoption grows, so does its attractiveness as a target for attackers. This is the first Attack post within our new Cloud & Container – Attack & Defend …

Climbing The Ladder | Kubernetes Privilege Escalation (Part 1) Read More »

macOS NotLockBit | Evolving Ransomware Samples Suggest a Threat Actor Sharpening Its Tools

Last week, researchers at Trend Micro published a report on a macOS malware sample that had credible file locking and data exfiltration capabilities and masqueraded as LockBit ransomware on successful encryption of a user’s files. Until now, ransomware threats for Mac computers had been at best ‘proof of concept’ and at worst entirely incapable of …

macOS NotLockBit | Evolving Ransomware Samples Suggest a Threat Actor Sharpening Its Tools Read More »

Powering New Customer Experience Possibilities

Imagine a customer walking into your retail location and effortlessly connecting to fast, secure Wi-Fi on their phone. Instantly, their app engages them with tailored location-specific information like available coupons and new products, based on personal preferences and buying behavior. When they’re ready to check out, they skip the register and leave without the wait …

Powering New Customer Experience Possibilities Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 42

The Good | DoJ Unseals Indictment Against Notorious ‘Anonymous Sudan’ DDoS Operators An unsealed indictment charged two brothers with operating the hacktivist group ‘Anonymous Sudan’, responsible for over 35,000 Distributed Denial of Service (DDoS) attacks globally. DDoS attacks work by flooding a target’s systems, usually via botnet, to send high levels of traffic and cause …

The Good, the Bad and the Ugly in Cybersecurity – Week 42 Read More »