[New eBook] 5 Best Practices For CISOs Adopting XDR Read Here
[New eBook] 5 Best Practices For CISOs Adopting XDR
Experiencing a Breach?
  • 1-855-868-3733
  • Contact
  • Cybersecurity Blog
en
  • English
  • 日本語
  • Deutsch
  • Español
  • Français
  • Italiano
  • Dutch
  • 한국어
Get a Demo
  • Platform
    The SentinelOne platform delivers the defenses you need to prevent, detect, and undo—known and unknown—threats.
    XDR Platform Overview
    Platform Packages
    SentinelOne for Zero Trust
    • Platform Packages
      • SingularitySingularity CompleteThe Future's Enterprise Security Platform
      • SingularitySingularity ControlSecurity with Suite Features
      • SingularitySingularity CoreCloud-Native NGAV
    • Platform Products
      • SingularitySingularity CloudContainer & Cloud
        Workload Security
      • SingularitySingularity IdentityIdentity Security
      • SentinelOneSentinelOne DataScalable Data Management
      • SingularitySingularity MobileMobile Threat Defense
      • SingularitySingularity RangerNetwork Visibility & Control
      • SingularitySingularity Ranger ADActive Directory Security
      • SingularitySingularity HologramAdversary Deception
      • SingularitySingularity XDR Power ToolsAdvanced XDR tools
  • Why SentinelOne?

    Why SentinelOne?

    SentinelOne is autonomous cybersecurity built for what’s next.

    Why SentinelOne
    Get a Demo
    • Why SentinelOne?
      • Our CustomersOur Customers Trusted by Leading Enterprises Around the Globe
      • About UsAbout Us The Industry Leader in Autonomous Cybersecurity
      • Industry RecognitionIndustry Recognition Tested & Proven
    • Compare SentinelOne
      • Vs CrowdStrike
      • Vs Microsoft Defender EPP+EDR
      • Vs Microsoft Defender XDR
      • Vs McAfee
      • Vs Symantec
      • Vs Carbon Black
      • Vs Palo Alto
      • Vs Trend Micro
    • Verticals
      • Energy
      • Federal Government
      • Finance
      • Healthcare
      • Higher Education
      • K-12 Education
      • Manufacturing
      • Retail
  • Services

    Global Services

    Augment leading technology with trusted expertise, and get set up for success with hands-on support and training.
    Services Overview
    Get Help Now
    • Threat Services
      • Vigilance Respond ProVigilance Respond Pro MDR + DFIR24x7 MDR with Full-Scale
        Investigation & Response
      • Vigilance RespondVigilance Respond MDRDedicated SOC
        Expertise & Analysis
      • WatchTower ProWatchTower Pro Threat HuntingDedicated Threat Hunting
        & Compromise Assessment
      • WatchTowerWatchTower Threat HuntingHunting for Active Campaigns
        & Emerging Threats
    • Support, Deployment, & Health
      • SentinelOne GOSentinelOne GO Guided Onboarding
        & Deployment Advisory
      • Support ServicesSupport Services Tiered Support Options
        for Every Organisation
      • Technical Account ManagementTechnical Account Management Customer Success with
        Personalised Service
      • SentinelOne UniversitySentinelOne University Live & On-Demand Training
  • Partners

    Partner Program

    See how SentinelOne works with trusted names worldwide to enhance programs, process, and technology.
    Program Overview
    • OUR NETWORK
      • Singularity MarketplaceSingularity Marketplace Extend the Power of S1 Technology
      • Technology AlliancesTechnology Alliances See Integrated, Enterprise-Scale Solutions
      • Channel PartnersChannel Partners Deliver the Right Solutions. Together
      • Cyber Risk PartnersCyber Risk Partners Enlist Pro Response & Advisory Terms
      • SentinelOne for AWSSentinelOne for AWS SentinelOne hosted in AWS
        regions around the world.
  • Resources

    Resources

    Your go-to source for the latest SentinelOne digital content, from webinars to white papers, and everything in between.
    Resource Center
    • Resource Center
      • Case Studies
      • Data Sheets
      • eBooks
      • Reports
      • Videos
      • Webinars
      • White Papers
    • Blog
      • Company
      • Cyber Response
      • Data Platform
      • Feature Spotlight
      • For CISO/CIO
      • From the Front Lines
      • Identity
      • Integrations & Partners
      • macOS
      • Podcasts
      • The Good, the Bad and the Ugly
    • Tech Resources
      • Sentinel 101
      • SentinelLabs
  • Company

    Company

    Here you will find all things SentinelOne. See how SentinelOne is redefining cybersecurity by pushing the boundariesof autonomous technology.

    • About SentinelOne
      • About SentinelOneAbout SentinelOne The Industry Leader
        in Cybersecurity
      • CareersCareers The Latest Job Opportunities
      • F1 RacingF1 Racing SentinelOne &
        Aston Martin F1 Team
      • Investor RelationsInvestor Relations Financial Information
        & Events
      • NewsNews Media Coverage & More
      • PressPress Company Announcements
      • FAQFAQ Get Answers to Our Most
        Frequently Asked Questions
      • BrandBrand SentinelOne Brand Guidelines
      • LabsLabs Threat Research for the
        Modern Threat Hunter
      • Cybersecurity BlogCybersecurity Blog The Latest Cybersecurity Threats, News, & More
      • DataSetDataSet The Live Data Platform
Back
  • Platform
    The SentinelOne platform delivers the defenses you need to prevent, detect, and undo—known and unknown—threats.
    XDR Platform Overview
    Platform Packages
    SentinelOne for Zero Trust
    • Platform Packages
      • SingularitySingularity CompleteThe Future's Enterprise Security Platform
      • SingularitySingularity ControlSecurity with Suite Features
      • SingularitySingularity CoreCloud-Native NGAV
    • Platform Products
      • SingularitySingularity CloudContainer & Cloud
        Workload Security
      • SingularitySingularity IdentityIdentity Security
      • SentinelOneSentinelOne DataScalable Data Management
      • SingularitySingularity MobileMobile Threat Defense
      • SingularitySingularity RangerNetwork Visibility & Control
      • SingularitySingularity Ranger ADActive Directory Security
      • SingularitySingularity HologramAdversary Deception
      • SingularitySingularity XDR Power ToolsAdvanced XDR tools
  • Why SentinelOne?

    Why SentinelOne?

    SentinelOne is autonomous cybersecurity built for what’s next.

    Why SentinelOne
    Get a Demo
    • Why SentinelOne?
      • Our CustomersOur Customers Trusted by Leading Enterprises Around the Globe
      • About UsAbout Us The Industry Leader in Autonomous Cybersecurity
      • Industry RecognitionIndustry Recognition Tested & Proven
    • Compare SentinelOne
      • Vs CrowdStrike
      • Vs Microsoft Defender EPP+EDR
      • Vs Microsoft Defender XDR
      • Vs McAfee
      • Vs Symantec
      • Vs Carbon Black
      • Vs Palo Alto
      • Vs Trend Micro
    • Verticals
      • Energy
      • Federal Government
      • Finance
      • Healthcare
      • Higher Education
      • K-12 Education
      • Manufacturing
      • Retail
  • Services

    Global Services

    Augment leading technology with trusted expertise, and get set up for success with hands-on support and training.
    Services Overview
    Get Help Now
    • Threat Services
      • Vigilance Respond ProVigilance Respond Pro MDR + DFIR24x7 MDR with Full-Scale
        Investigation & Response
      • Vigilance RespondVigilance Respond MDRDedicated SOC
        Expertise & Analysis
      • WatchTower ProWatchTower Pro Threat HuntingDedicated Threat Hunting
        & Compromise Assessment
      • WatchTowerWatchTower Threat HuntingHunting for Active Campaigns
        & Emerging Threats
    • Support, Deployment, & Health
      • SentinelOne GOSentinelOne GO Guided Onboarding
        & Deployment Advisory
      • Support ServicesSupport Services Tiered Support Options
        for Every Organisation
      • Technical Account ManagementTechnical Account Management Customer Success with
        Personalised Service
      • SentinelOne UniversitySentinelOne University Live & On-Demand Training
  • Partners

    Partner Program

    See how SentinelOne works with trusted names worldwide to enhance programs, process, and technology.
    Program Overview
    • OUR NETWORK
      • Singularity MarketplaceSingularity Marketplace Extend the Power of S1 Technology
      • Technology AlliancesTechnology Alliances See Integrated, Enterprise-Scale Solutions
      • Channel PartnersChannel Partners Deliver the Right Solutions. Together
      • Cyber Risk PartnersCyber Risk Partners Enlist Pro Response & Advisory Terms
      • SentinelOne for AWSSentinelOne for AWS SentinelOne hosted in AWS
        regions around the world.
  • Resources

    Resources

    Your go-to source for the latest SentinelOne digital content, from webinars to white papers, and everything in between.
    Resource Center
    • Resource Center
      • Case Studies
      • Data Sheets
      • eBooks
      • Reports
      • Videos
      • Webinars
      • White Papers
    • Blog
      • Company
      • Cyber Response
      • Data Platform
      • Feature Spotlight
      • For CISO/CIO
      • From the Front Lines
      • Identity
      • Integrations & Partners
      • macOS
      • Podcasts
      • The Good, the Bad and the Ugly
    • Tech Resources
      • Sentinel 101
      • SentinelLabs
  • Company

    Company

    Here you will find all things SentinelOne. See how SentinelOne is redefining cybersecurity by pushing the boundariesof autonomous technology.

    • About SentinelOne
      • About SentinelOneAbout SentinelOne The Industry Leader
        in Cybersecurity
      • CareersCareers The Latest Job Opportunities
      • F1 RacingF1 Racing SentinelOne &
        Aston Martin F1 Team
      • Investor RelationsInvestor Relations Financial Information
        & Events
      • NewsNews Media Coverage & More
      • PressPress Company Announcements
      • FAQFAQ Get Answers to Our Most
        Frequently Asked Questions
      • BrandBrand SentinelOne Brand Guidelines
      • LabsLabs Threat Research for the
        Modern Threat Hunter
      • Cybersecurity BlogCybersecurity Blog The Latest Cybersecurity Threats, News, & More
      • DataSetDataSet The Live Data Platform
Get a Demo
  • 1-855-868-3733
  • Contact
  • Cybersecurity Blog
Experiencing a Breach?
Category

James Haughom

labs

LockBit Ransomware Side-loads Cobalt Strike Beacon with Legitimate VMware Utility

Crimeware
Read More >

From the Front Lines | Peering into A PYSA Ransomware Attack

From the Front Lines | 14 minute read
Read More >

From the Front Lines | Hive Ransomware Deploys Novel IPfuscation Technique To Avoid Detection

From the Front Lines | 12 minute read
Read More >
labs

SolarWinds SUNBURST Backdoor: Inside the APT Campaign

Advanced Persistent Threat
Read More >

Search

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

Recent Posts

  • Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years
    Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years
    June 9, 2022
  • Use of Obfuscated Beacons in ‘pymafka’ Supply Chain Attack Signals a New Trend in macOS Attack TTPs
    Use of Obfuscated Beacons in ‘pymafka’ Supply Chain Attack Signals a New Trend in macOS Attack TTPs
    May 25, 2022
  • CrateDepression | Rust Supply-Chain Attack Infects Cloud CI Pipelines with Go Malware
    CrateDepression | Rust Supply-Chain Attack Infects Cloud CI Pipelines with Go Malware
    May 19, 2022

Labs Categories

  • Security Research
  • Security & Intelligence
  • Crimeware
  • Adversary
  • Advanced Persistent Threat

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Latest Tweet

  • New from SentinelLabs! A new #typosquatting attack against the #PyPI repository targets enterprise Macs with a dis… https://t.co/YIKUYfqSDf38 days ago
  • We just released a research on a supply-chain attack against the Rust development community. We referred to it as… https://t.co/T6T3Cp5cWa44 days ago
  • The Centre for Cybersecurity Belgium (CCB) kindly invites you to its online CCB Share & Connect event – previousl… https://t.co/7yoL03kHyp61 days ago
  • New on #SentinelLabs! We have disclosed 10.0 CVSS vulnerabilities on Microsoft’s Azure Defender for IoT allowing u… https://t.co/cEnYqccXrV95 days ago

Recent Posts

  • Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years
    Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years
    June 9, 2022
  • Use of Obfuscated Beacons in ‘pymafka’ Supply Chain Attack Signals a New Trend in macOS Attack TTPs
    Use of Obfuscated Beacons in ‘pymafka’ Supply Chain Attack Signals a New Trend in macOS Attack TTPs
    May 25, 2022
  • CrateDepression | Rust Supply-Chain Attack Infects Cloud CI Pipelines with Go Malware
    CrateDepression | Rust Supply-Chain Attack Infects Cloud CI Pipelines with Go Malware
    May 19, 2022

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2022 SentinelOne, All Rights Reserved.