Get Free Information Around Information Security &
The Latest News in Cybersecurity Right to Your Inbox

Blog

The 7 ‘Most Common’ RATS In Use Today

Sniffing out RATS — remote access Trojans — is a challenge for even the most hardened cyber defender. Here’s a guide to help you in the hunt. Earlier this month, the Office of Personnel Management reported that 21.5 million Americans had their social security numbers and other sensitive data stolen in the second breach to […]

READ MORE

CryptoWall – Capturing The Threat

Background Cryptowall is an aggressive form of malware designed to infect a computer and steal its data. Once Cryptowall infects a computer, attackers steal the data and lock it behind an encryption wall. To unlock the data, victims are forced to pay a ransom fee. Various forms of Cryptowall exist; in this blog post we […]

READ MORE

Get Ready for Complete AV Replacement

They said it couldn’t be done. When we started SentinelOne people told us we were crazy… Targeting the antivirus vendors? Developing a completely new technology to replace existing antivirus suites? Disrupting a space that hadn’t experienced any significant innovation in 20 years? That definitely sounds crazy. But we’ve done it and now it’s official. We’ve […]

READ MORE

Reversing Prince Harming’s kiss of death

The suspend/resume vulnerability disclosed a few weeks ago (named Prince Harming by Katie Moussouris) turned out to be a zero day. While (I believe) its real world impact is small, it is nonetheless a critical vulnerability. It must be noticed that firmware issues are not Apple exclusive. For example, Gigabyte ships their UEFI with the […]

READ MORE

What is Next Generation Endpoint Protection?

By now you have probably heard the term “Next Generation Endpoint Protection. A slew of companies, startups and incumbents alike use the term to describe some of their offerings. But what does it actually mean? What are the capabilities you should look for in a Next Generation Endpoint Protection Platform? What makes it “next generation”? […]

READ MORE

Turning the Tables on “Rombertik” Reveals the Story Behind the Threat

A malware variant named “Rombertik” recently made headlines for its ability to wipe the Master Boot Record (MBR) of a machine if it detected the presence of analysis or debugging functions. For example, Rombertik can detect system strings that contain “malwar,” “sampl,” “viru,” and “sandb,” – all commonly used strings by malware researchers and online […]

READ MORE

Salesforce Warns of Dyre Malware Possibly Targeting Users

Now Dyre could be going after Salesforce credentials, possibly to enable theft of databases or to further spread the malware through a known source, Tomer Weingarten, CEO of SentinelOne, told SCMagazine.com on Monday, adding that Dyre can be repurposed to go after any type of credentials. Read the full news article

READ MORE

SentinelOne announces Endpoint Detection Response

SentinelOne has developed a predictive execution inspection engine that analyzes application processes in real time. It combines attack pattern and malware technique modeling with up-to-the-minute crowd sourced security intelligence to protect against even the most stealth threats. Read the full news article

READ MORE

The Long Game: How hackers Spent Months Pulling Bank Data From JPMorgan

Researchers at security software provider SentinelOne’s Labs in July found “intelligence agency grade” carrier malware designed to target government agencies being used by Russian cybercriminals to deliver crimeware to targets. Read the full news article

READ MORE