The Latest News in Cybersecurity Right to Your Inbox Thank you!
You will now be notified when a new blog post is published.
The 7 ‘Most Common’ RATS In Use Today
Sniffing out RATS — remote access Trojans — is a challenge for even the most hardened cyber defender. Here’s a guide to help you in the hunt. Earlier this month, the Office of Personnel Management reported that 21.5 million Americans had their social security numbers and other sensitive data stolen in the second breach to […]READ MORE
CryptoWall – Capturing The Threat
Background Cryptowall is an aggressive form of malware designed to infect a computer and steal its data. Once Cryptowall infects a computer, attackers steal the data and lock it behind an encryption wall. To unlock the data, victims are forced to pay a ransom fee. Various forms of Cryptowall exist; in this blog post we […]READ MORE
Get Ready for Complete AV Replacement
They said it couldn’t be done. When we started SentinelOne people told us we were crazy… Targeting the antivirus vendors? Developing a completely new technology to replace existing antivirus suites? Disrupting a space that hadn’t experienced any significant innovation in 20 years? That definitely sounds crazy. But we’ve done it and now it’s official. We’ve […]READ MORE
Reversing Prince Harming’s kiss of death
The suspend/resume vulnerability disclosed a few weeks ago (named Prince Harming by Katie Moussouris) turned out to be a zero day. While (I believe) its real world impact is small, it is nonetheless a critical vulnerability. It must be noticed that firmware issues are not Apple exclusive. For example, Gigabyte ships their UEFI with the […]READ MORE
What is Next Generation Endpoint Protection?
By now you have probably heard the term “Next Generation Endpoint Protection. A slew of companies, startups and incumbents alike use the term to describe some of their offerings. But what does it actually mean? What are the capabilities you should look for in a Next Generation Endpoint Protection Platform? What makes it “next generation”? […]READ MORE
Turning the Tables on “Rombertik” Reveals the Story Behind the Threat
A malware variant named “Rombertik” recently made headlines for its ability to wipe the Master Boot Record (MBR) of a machine if it detected the presence of analysis or debugging functions. For example, Rombertik can detect system strings that contain “malwar,” “sampl,” “viru,” and “sandb,” – all commonly used strings by malware researchers and online […]READ MORE
Salesforce Warns of Dyre Malware Possibly Targeting Users
Now Dyre could be going after Salesforce credentials, possibly to enable theft of databases or to further spread the malware through a known source, Tomer Weingarten, CEO of SentinelOne, told SCMagazine.com on Monday, adding that Dyre can be repurposed to go after any type of credentials. Read the full news articleREAD MORE
SentinelOne announces Endpoint Detection Response
SentinelOne has developed a predictive execution inspection engine that analyzes application processes in real time. It combines attack pattern and malware technique modeling with up-to-the-minute crowd sourced security intelligence to protect against even the most stealth threats. Read the full news articleREAD MORE
The Long Game: How hackers Spent Months Pulling Bank Data From JPMorgan
Researchers at security software provider SentinelOne’s Labs in July found “intelligence agency grade” carrier malware designed to target government agencies being used by Russian cybercriminals to deliver crimeware to targets. Read the full news articleREAD MORE