SentinelLabs Logo RGB WhitePurp
ABOUT
CONTACT
VISIT SENTINELONE.COM

Dakota Cary

Dakota Cary is a China-focused consultant at SentinelOne and a nonresident fellow at the Atlantic Council’s Global China Hub. Dakota previously was a research analyst at Georgetown University’s Center for Security and Emerging Technology on the CyberAI Project. He focuses on China’s efforts to develop its hacking capabilities. His reports examine artificial intelligence and cybersecurity research at Chinese universities, the People’s Liberation Army’s efforts to automate software vulnerability discovery, China's vulnerability collection system, and policies to improve the country’s cybersecurity-talent pipeline. He has been featured and quoted on his expertise in a variety of outlets, including The Economist, MIT Technology Review, Associated Press, Financial Times, and Wired. Cary has also testified before the US-China Economic and Security Review Commission.
Malicious Apprentice 6
Security & Intelligence

Malicious Apprentice | How Two Hackers Went From Cisco Academy to Cisco CVEs

Dakota Cary / December 10, 2025

Read how two Cisco Network Academy Cup winners went from students to operators behind Salt Typhoon, a global cyber espionage campaign targeting telecoms.

Read More

PinnacleOne ExecBrief | Economists on AI & Workplace Productivity

PinnacleOne | 3 minute read
Read More >
I Soons Data Breach The Leak That Revealed Chinas Cyber Operations 5
Advanced Persistent Threat

Unmasking I-Soon | The Leak That Revealed China’s Cyber Operations

Dakota Cary & Aleksandar Milenkoski / February 21, 2024

The I-Soon leak reveals the maturing nature of China’s cyber espionage and a competitive hacker marketplace driven by government demands.

Read More
Chinas Cyber Revenge Why The PNC Fails To Back Its Claims Of Western Espionage 4
Security & Intelligence

China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage

Dakota Cary / February 12, 2024

China's claims of hacks and espionage lack the rigorous technical detail seen in western threat intel. Why the asymmetry, and how does it benefit the PRC?

Read More

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • LABScon25 Replay | How to Bug Hotel Rooms v2.0
    LABScon25 Replay | How to Bug Hotel Rooms v2.0
    January 21, 2026
  • LLMs in the SOC (Part 1) | Why Benchmarks Fail Security Operations Teams
    LLMs in the SOC (Part 1) | Why Benchmarks Fail Security Operations Teams
    January 20, 2026
  • LABScon25 Replay | Hacktivism and War: A Clarifying Discussion
    LABScon25 Replay | Hacktivism and War: A Clarifying Discussion
    January 14, 2026

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2026 SentinelOne, All Rights Reserved.