Blog

Posted on

Announcing SentinelOne 2.0 Version

We’re happy to announce our new version, introducing the simplified policy, improved prevention, detection, and response, and many more features, fixes, and enhancements. Our customers have been telling us which improvements they want to see in our product, and we are responding. Let’s go over the most significant changes. Simple Policy SentinelOne’s policy was never […]

READ MORE
Posted on

Think you can overlook Linux? Think again!

According to recent news a hacker pleaded guilty and was sentenced to 46 months in prison for spreading Linux malware. He admitted that he made profits from a massive Ebury botnet scheme that was associated with thousands of compromised Linux systems. The malware had the capacity to send more than 35 million spam messages and […]

READ MORE
featured
Posted on

RTF zero day in the wild

FireEye recently published an RTF zero day that has been used in the wild since July. This zero day was used to spread FinSpy/FinFisher malware, a “lawful intercept” product with RAT-like capabilities. The disclosed vulnerability is a logical vulnerability, which means most EMET style anti-exploitation techniques (ASLR, DEP, CFG) are irrelevant. As are any other pre-execution security mechanisms […]

READ MORE
Posted on

Addressing the Security-Encryption Paradox

Encryption is a critical partner to organizational security. Except when it isn’t! It’s clear that encryption has a key role in ensuring that organizational data stays invisible and protected. Technology giants such as Google are pushing us towards encryption – whether it’s via prioritizing search results[1] or flagging unencrypted sites as unsafe[2]. WordPress, the most […]

READ MORE
Posted on

OSX.Pwnet.A – CS: GO Hack and Sneaky Miner

(Photo source: Pony Strike: Global Offense by FilipinoNinja95) We recently found a hack for Counter-Strike: Global Offensive on macOS that is also a trojan that could mine CryptoCurrencies without user consent. According to VirusTotal Retrohunt, the threat is in the wild since the beginning of July 2017. Warning: At the time of this writing, all […]

READ MORE
Posted on

Measuring the Usefulness of Multiple Models

The past several years have seen a massive increase in products, services, and features which are powered or enhanced by artificial intelligence — voice recognition, facial recognition, targeted advertisements, and so on. In the anti-virus industry, we’ve seen a similar trend with a push away from traditional, signature-based detection towards fancy machine learning models. Machine […]

READ MORE
Posted on

SentinelOne Virtual Appliance: Cloud When You Want It, On-premises When You Need It

We are pleased to announce the immediate availability of the SentinelOne Virtual Appliance for customers who prefer to have their security consoles running in their own data centers.  SentinelOne has been serving the needs of these customers from our early days, but the new appliance cuts down the complexity in setting up the console on-premises. […]

READ MORE
Posted on

Securing Virtual Desktop Infrastructure (VDI)

The SentinelOne agent is an efficient solution to secure the growing demand for agent virtualization, including thin clients, layered apps, and other VDI scenarios. It does not require updates and is not dependent on signatures or other legacy antivirus features. The SentinelOne offering for VDI includes all protection engines and functionality, the same as we […]

READ MORE
Posted on

Dissecting NotPetya: So you thought it was ransomware

By Caleb Fenton, Joseph Landry, Nir Izraeli, Itai Liba, and Udi Shamir, Senior Security Researchers, SentinelOne Labs NotPetya was in the news this week, making headlines for being yet another ransomware attack that spread like fire – affecting organizations in several verticals across 65+ countries, drawing comparisons with the WannaCry attack that recently hit over […]

READ MORE