Blog

Posted on

Is a Walled Garden Better for Security?

With the issue of cybersecurity becoming increasingly important every year, and security professionals feeling under fire by battalions of hackers and malicious actors around the world, some firms have turned to building walls around the apps and services that they offer to users. This idea, commonly referred to as a “walled garden,” works on the […]

READ MORE
Posted on

vCrypt1 ransomware analysis

Overview Ransomware is a great source of income for many crime groups and we have seen many examples that are quite sophisticated and employ strong encryption techniques. Sophisticated ransomware typically signals a larger operation is behind the strain with a whole backend infrastructure that includes “support staff” that can provide decoding services once a ransom […]

READ MORE
Posted on

Practice These 10 Basic Cyber Hygiene Tips for Risk Mitigation

For six years in a row, cybersecurity has been identified as the #1 “problematic shortage” area across all of IT. What’s more concerning is that in 2016 and 2017, there was a dramatic increase in the shortage across organizations. With companies scrambling for cybersecurity personnel, they are also distracted by involvement in an innovation race. […]

READ MORE
Posted on

Introducing: SentinelOne Enterprise Risk Index

SentinelOne’s new Enterprise Risk Index (ERI) provides new evidence of the proportion of attacks that simply cannot be stopped by traditional, static, file inspection security solutions. It’s further proof that attack methods have rendered AV redundant. The ERI is intended as a resource on the commonly encountered threat vectors seen in production environments, as well […]

READ MORE
Posted on

Prevent Cyber Attacks Through a Lesson in Ransomware Anatomy

You’ve been suffering from flu-like symptoms for over a week now, so you drag yourself out of bed to see your doctor. Once at the appointment, the doctor does a thorough examination before determining the correct course of treatment for your infliction. And you might even walk away with a lesson in hand washing and […]

READ MORE
Posted on

SentinelOne Detects Shadow Broker Binaries with DFI

Waves of panic were sent through the cybersecurity community as suspected NSA spying tools were released by the Shadow Broker group. What appeared to be potentially one of the most damaging releases of nation-state tool, zero-day exploits was quickly neutralized. Microsoft came forward to announce that although the files contained about 20 different Windows-based exploits, […]

READ MORE
Posted on

Preventing Ransomware Attacks Becomes Vital in Healthcare

The deluge of ransomware attacks in 2016 on hospitals and other healthcare facilities plastered headlines. It even seemed that healthcare could be the most susceptible industry to face such attacks. Facilities providing critical care rely on access to up-to-date information from patient records or face delays that could cause malpractice or even death. With a […]

READ MORE
Posted on

Dump the Sandbox

Technology becomes obsolete quickly in a variety of industries as “newer” and “more innovative” options crop up on what feels like an almost daily basis. The same is true for the pace of technological innovation in the information security space. Traditional antivirus vendors spurred on by waning detection rates and unhappy customers have been acquiring […]

READ MORE
Posted on

CVE-2017-0199: What REAL 0-Day Vulnerability Protection Looks Like

News of a Microsoft Word 0-day vulnerability spread like wildfire this week. Discovered by FireEye, the attack uses is executed when a user opens a Word attachment that includes a malicious OLE2 (Object Linking and Embedding) embedded in a specially-crafted Word document that can then spread the Dridex banking Trojan. The 0-day vulnerability, CVE-2017-0199, was […]

READ MORE