The Latest News in Cybersecurity Right to Your Inbox Thank you!
You will now be notified when a new blog post is published.
Meet Cryptojacking, the (not so) new kid on the block
Cryptomining malware can cripple your endpoints but remains difficult to detect. Here’s what you need to know.READ MORE
Inside Safari Extensions | Malicious Plugins Remain on Mojave
In Part 2, we explore the pros and cons of Apple’s new architecture and what it means for macOS malware & adwareREAD MORE
Inside Safari Extensions | Malware’s Golden Key to User Data
A 2-part series looking at the technology behind macOS extensions and how malicious add-ons can steal passwords, banking details and other sensitive dataREAD MORE
Announcing SentinelOne Nexus Embedded AI SDK!
Nexus Embedded AI SDK is an embeddable AI-based technology that uses SentinelOne’s predictive models to classify files as benign or malicious based on their characteristics and without using signature or cloud lookup. It’s now available as GA!READ MORE
SentinelOne Receives Silver Certification from OPSWAT
OPSWAT announced that SentinelOne received a Silver certification for the Anti-Malware from the OPSWAT Certified Security Application Program, which tests anti-malware applications for quality and compatibilityREAD MORE
5 “Safe Computing” Practices for macOS and Why They Aren’t Enough
Phishing scams, trojans and ransomware are all live threats on Apple’s platform. Is it time for the macOS community to embrace Next Gen AV software?READ MORE
[Guest Post] Incident Response Plan: A Pragmatic Journey: Part 1 – Preparation
IT Security Consultant Giammaria Urbisaglia explores real-world Incident Response skills in this 3-part series covering preparation, investigation & incident closureREAD MORE
SKREAM: Kernel-Mode Exploits Mitigations For the Rest of Us
This article presents a Windows kernel exploitation technique and suggests a method to mitigate the vulnerability that enables itREAD MORE
Mojave’s security “hardening” | User protections could be bypassed
Any local or remote user can bypass Apple’s new Full Disk Access requirement using ssh. Find out how to stay safeREAD MORE