Experiencing a Breach?
  • 1-855-868-3733
  • Contact
  • Cybersecurity Blog
en
  • English
  • 日本語
  • Deutsch
  • Español
  • Français
  • Italiano
  • Dutch
  • 한국어
Header Logo Dark blog
Platform
  • Platform Overview
    • Singularity Platform Welcome to Integrated
      Enterprise Security
    • Singularity XDR Native & Open Protection,
      Detection, and Response
    • Singularity Data Lake AI-Powered,
      Unified Data Lake
    • How It Works The Singularity XDR Difference
    • Singularity Marketplace One-Click Integrations to Unlock the Power of XDR
  • Surfaces
    • Endpoint Autonomous Prevention, Detection, and Response
    • Cloud Autonomous Runtime Protection for Workloads
    • Identity Autonomous Identity & Credential Protection
  • Platform Packages
    • Singularity Complete The Standard for Enterprise Cybersecurity
    • Singularity Control Organization-Wide
      Protection and Control
    • Singularity Core Cloud-Native NGAV
    • Package Comparison Our Platform at a Glance
  • Platform Products
    • Singularity Cloud Workload Security Real-Time Cloud Workload Protection Platform
    • Purple AI Accelerate SecOps with Generative AI
    • Singularity Mobile Mobile Threat Defense
    • Singularity
      Threat Intelligence
      Comprehensive adversary intelligence
    • Singularity Cloud
      Data Security
      AI-Powered Threat Detection
    • Singularity
      RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Identity Identity Threat Detection
      and Response
    • Singularity Ranger AD Active Directory Attack Surface Reduction
    • Singularity Ranger Insights Rogue Asset Discovery
    • Singularity Hologram Deception Protection
Why SentinelOne?
  • Why SentinelOne?
    • Why SentinelOne? Cybersecurity Built
      for What’s Next
    • Our Customers Trusted by the World’s Leading Enterprises
    • Industry Recognition Tested and Proven
      by the Experts
    • About Us The Industry Leader in Autonomous Cybersecurity
  • Compare SentinelOne
    • CrowdStrike Cyber Dependent
      on a Crowd
    • McAfee Pale Performance,
      More Maintenance
    • Microsoft Platform Coverage
      That Compromises
    • Trend Micro The Risk of DevOps Disruption
    • Palo Alto Networks Hard to Deploy,
      Harder to Manage
    • Carbon Black Adapt Only as Quickly
      as Your Block Lists
    • Symantec Security Limited
      to Signatures
  • Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
Services
  • Strategic Services
    • PinnacleOne Strategic Advisory Group
    Services Overview
  • Threat Services
    • WatchTower
      Threat Hunting
      Hunting for Emerging Threat Campaigns
    • Vigilance Respond
      MDR
      Dedicated SOC
      Expertise & Analysis
    • Vigilance Respond Pro
      MDR + DFIR
      24x7 MDR with Full-Scale Investigation & Response
  • Support, Deployment, & Health
    • Technical Account Management Customer Success with Personalized Service
    • SentinelOne GO Guided Onboarding & Deployment Advisory
    • SentinelOne University Live and On-Demand Training
    • Support Services Tiered Support Options for Every Organization
    • SentinelOne Community Community Login
Partners
  • Our Network
    • MSSP Partners Succeed Faster
      with SentinelOne
    • Singularity Marketplace Extend the Power
      of S1 Technology
    • Cyber Risk
      Partners
      Enlist Pro Response
      and Advisory Teams
    • Technology Alliances Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS Hosted in AWS Regions Around the World
    • Channel Partners Deliver the Right
      Solutions, Together
    Program Overview
Resources
  • Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • White Papers
    View All Resources
  • Blog
    • Cyber Response
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog
  • Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
About
  • About SentinelOne
    • About SentinelOne The Industry Leader in Cybersecurity
    • Investor Relations Financial Information & Events
    • SentinelLABS Threat Research for
      the Modern Threat Hunter
    • Careers The Latest Job Opportunities
    • Press & News Company Announcements
    • Cybersecurity Blog The Latest Cybersecurity Threats, News, & More
    • F1 Racing SentinelOne &
      Aston Martin F1 Team
    • FAQ Get Answers to Our Most Frequently Asked Questions
    • DataSet The Live Data Platform
    • S Foundation Securing a Safer Future for All
    • S Ventures Investing in the Next Generation
      of Security and Data
en
  • English
  • 日本語
  • Deutsch
  • Español
  • Français
  • Italiano
  • Dutch
  • 한국어
Get a Demo
From the Front Lines, macOS | 9 minute read

Backdoor Activator Malware Running Rife Through Torrents of macOS Apps

Read More >
Backdoor Activator Malware Running Rife 18

Protecting macOS |  7 Strategies for Enterprise Security in 2024

macOS | 12 minute read
Read More >

macOS Malware 2023 | A Deep Dive into Emerging Trends and Evolving Techniques

macOS | 9 minute read
Read More >

Sonoma in the Spotlight | What’s New and What’s Missing in macOS 14

macOS | 8 minute read
Read More >

macOS MetaStealer | New Family of Obfuscated Go Infostealers Spread in Targeted Attacks 

From the Front Lines, macOS | 11 minute read
Read More >
The Complete Guide to Understanding Apple Mac Security for Enterprise
Learn how to secure macOS devices in the enterprise with this in-depth review of the strengths and weaknesses of Apple's security technologies
Read Now

Mac Admins | Why Apple’s Silent Approach to Endpoint Security Should be a Wake-Up Call

macOS | 8 minute read
Read More >

Apple Crimeware | Massive Rust Infostealer Campaign Aiming for macOS Sonoma Ahead of Public Release

From the Front Lines, macOS | 12 minute read
Read More >

macOS 14 Sonoma | Toughening up macOS for the Enterprise?

macOS | 8 minute read
Read More >

Geacon Brings Cobalt Strike Capabilities to macOS Threat Actors

From the Front Lines, macOS | 6 minute read
Read More >

Atomic Stealer | Threat Actor Spawns Second Variant of macOS Malware Sold on Telegram

macOS | 16 minute read
Read More >

LockBit for Mac | How Real is the Risk of macOS Ransomware?

From the Front Lines, macOS | 10 minute read
Read More >
Previous
1 2 3 … 9
Next

Listen to this Post

Search

Sign Up

Keep up to date with our weekly digest of articles.

Thanks! Keep an eye out for new content!

Recent Posts

  • The Good, the Bad and the Ugly in Cybersecurity – Week 7
    February 16, 2024
  • PinnacleOne Alert | Russian Space-Based Nuclear Anti-Satellite Weapon
    February 15, 2024
  • Kryptina RaaS | From Underground Commodity to Open Source Threat
    February 14, 2024

Blog Categories

  • Cloud
  • Company
  • Data Platform
  • Feature Spotlight
  • For CISO/CIO
  • From the Front Lines
  • Identity
  • Integrations & Partners
  • macOS
  • PinnacleOne
  • The Good, the Bad and the Ugly
©2024 SentinelOne, All Rights Reserved.
Privacy Policy Master Subscription Agreement
Company
  • Our Customers
  • Why SentinelOne
  • Platform
  • About
  • Partners
  • Support
  • Careers
  • Legal & Compliance
  • Security & Compliance
  • Contact Us
  • Investor Relations
Resources
  • Blog
  • Labs
  • Hack Chat
  • Press
  • News
  • FAQ
  • Resources
  • Ransomware Anthology
Global Headquarters

444 Castro Street
Suite 400
Mountain View, CA 94041

+1-855-868-3733

[email protected]

Sign Up For Our Newsletter
Thank you! You will now receive our weekly newsletter with all recent blog posts. See you soon!
Language
English
  • English
  • 日本語
  • Deutsch
  • Español
  • Français
  • Italiano
  • Dutch
  • 한국어