The Latest News in Cybersecurity Right to Your Inbox Thank you!
You will now be notified when a new blog post is published.
Malicious Media | Why Your Endpoints Need Device Control
If your security solution does not manage USBs, your endpoints are beyond your controlREAD MORE
Feature Spotlight – Firewall Control
Endpoint Firewall Control allows IT & security teams to manage and enforce network access policy to and from endpoints, even outside the corporate networkREAD MORE
Feature Spotlight – Device Control
IT & security teams need full visibility and control over how USBs and other peripherals are used. Learn about SentinelOne’s new Device Control featureREAD MORE
How Malware Can Easily Defeat Apple’s macOS Security
or the one where we argue why your business really needs antivirus protectionREAD MORE
How We Detected a Real Empire Exploit Attack
The post describes an attack that was carried out during a POC at a customer site and handled by the SentinelOne Agent and Vigilance serviceREAD MORE
macOS Spyware | The Dangers of a Fake CryptoWallet Keylogger
We investigate a macOS keylogger targeting Exodus cryptocurrency asset manager. Learn what to look out for and how to avoid similar spyware attacksREAD MORE
What Is Windows PowerShell (And Could It Be Malicious)?
How can PowerShell impact your business’s valuable assets? Learn the basics of PowerShell, why it’s attractive to hackers & how to protect the enterpriseREAD MORE
Feature Spotlight – Behavioral Indicators and MITRE ATT&CK™ for Enterprise Support
Learn how enterprise can benefit from the integration of Behavioural Indicators and MITRE ATT&CK matrixREAD MORE
Holiday Shoppers! 5 Tips to Beat Seasonal CyberCriminals
With a sharp rise in online sales, holiday season is a busy time for internet scammers. Here’s our guide to staying safe while shopping onlineREAD MORE