Network Security

The Good, the Bad and the Ugly in Cybersecurity – Week 15

The Good | Police Unmask 200 LockBit Affiliates Following the takedown of their operations earlier in the year, the inner workings of LockBit’s affiliate infrastructure have become clearer this week as investigations continue. The UK’s National Crime Agency, with assistance from the FBI, have reportedly matched a list of pseudonyms used by the ransomware gang …

The Good, the Bad and the Ugly in Cybersecurity – Week 15 Read More »

XZ Utils Backdoor | Threat Actor Planned to Inject Further Vulnerabilities

On Mar 29, 2024 details emerged about CVE-2024-3094, a vulnerability impacting the xz compression libraries used by Linux distributions. The backdoor code was distributed to all rolling distributions. However, it was tailored to target distributions such as Debian and Fedora, which patch their SSH daemon with liblzma. Further, the backdoor scripts included system checks to …

XZ Utils Backdoor | Threat Actor Planned to Inject Further Vulnerabilities Read More »

PinnacleOne ExecBrief | Navigating the Era of AI in Cybersecurity: Challenges, Opportunities & Emerging Solutions

Last week, PinnacleOne detailed how geopolitical dynamics and cyber threats drive risk for firms investing in or building strategic technologies. This week, we focus on how emerging generative AI tools are accelerating cybersecurity defensive capabilities, with a deep dive on SentinelOne’s newly released Purple AI. Please subscribe to read future issues — and forward this …

PinnacleOne ExecBrief | Navigating the Era of AI in Cybersecurity: Challenges, Opportunities & Emerging Solutions Read More »

Transform SecOps with Purple AI, Now Generally Available

Imagine if hunting for emerging threats was as straightforward as asking a colleague a simple question in plain language. Today, I’m excited to announce that SentinelOne has turned this into a reality with the launch of Purple AI. Last April, we unveiled a first-of-its-kind AI-assisted platform that fuses data from SentinelOne’s real-time, embedded neural networks …

Transform SecOps with Purple AI, Now Generally Available Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 14

The Good | Developer Uncovers Backdoor Planted in XZ Utils Over the Easter weekend, software developer Andres Freund uncovered a backdoor hidden within XZ Utils, an open-source data compressor ubiquitous in nearly all Linux-based systems. Currently, the supply chain flaw is tracked as CVE-2024-3094 (CVSS score: 10.0) and is being described as what could have …

The Good, the Bad and the Ugly in Cybersecurity – Week 14 Read More »

PinnacleOne ExecBrief | Geopolitical and Cyber Risk in the Portfolio

Last week, PinnacleOne examined the geopolitical dynamics and risks facing firms that do business or have key dependencies in China and highlighted principles to frame a China-for-China strategy given firm-specific threat models. This week, we focus on the intersection of geopolitical and cyber risks facing western firms investing in strategic technologies and the dangers of …

PinnacleOne ExecBrief | Geopolitical and Cyber Risk in the Portfolio Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 13

The Good | U.S. Treasury Cracks Down on Russian & Chinese State-Backed Threats In back-to-back announcements this week, the U.S. Department of the Treasury has sanctioned cryptocurrency exchanges leveraged by Russian dark markets and a Chinese-based company linked to APT31 threat actors (aka Zirconium and Violet Typhoon). Thirteen entities and two individuals now face sanctions …

The Good, the Bad and the Ugly in Cybersecurity – Week 13 Read More »

Optimizing Physical Security through Automation

This article was contributed by Kisi, a Meraki technology partner.   The security sector has seen several innovations over the years that have changed the scope of facility management and protection. One of these areas of advancement has been the automation of security processes and responses, which has provided efficiency on a new scale.   From automated …

Optimizing Physical Security through Automation Read More »