Get Free Information Around Information Security &
The Latest News in Cybersecurity Right to Your Inbox

Blog

Meet Cryptojacking, the (not so) new kid on the block

Cryptomining malware can cripple your endpoints but remains difficult to detect. Here’s what you need to know.

READ MORE

Inside Safari Extensions | Malicious Plugins Remain on Mojave

In Part 2, we explore the pros and cons of Apple’s new architecture and what it means for macOS malware & adware

READ MORE

Inside Safari Extensions | Malware’s Golden Key to User Data

A 2-part series looking at the technology behind macOS extensions and how malicious add-ons can steal passwords, banking details and other sensitive data

READ MORE

Announcing SentinelOne Nexus Embedded AI SDK!

Nexus Embedded AI SDK is an embeddable AI-based technology that uses SentinelOne’s predictive models to classify files as benign or malicious based on their characteristics and without using signature or cloud lookup. It’s now available as GA!

READ MORE

SentinelOne Receives Silver Certification from OPSWAT

OPSWAT announced that SentinelOne received a Silver certification for the Anti-Malware from the OPSWAT Certified Security Application Program, which tests anti-malware applications for quality and compatibility

READ MORE

5 “Safe Computing” Practices for macOS and Why They Aren’t Enough

Phishing scams, trojans and ransomware are all live threats on Apple’s platform. Is it time for the macOS community to embrace Next Gen AV software?

READ MORE

[Guest Post] Incident Response Plan: A Pragmatic Journey: Part 1 – Preparation

IT Security Consultant Giammaria Urbisaglia explores real-world Incident Response skills in this 3-part series covering preparation, investigation & incident closure

READ MORE

SKREAM: Kernel-Mode Exploits Mitigations For the Rest of Us

This article presents a Windows kernel exploitation technique and suggests a method to mitigate the vulnerability that enables it

READ MORE

Mojave’s security “hardening” | User protections could be bypassed

Any local or remote user can bypass Apple’s new Full Disk Access requirement using ssh. Find out how to stay safe

READ MORE