Security

What is a Phishing Scam? (And What to Do to Stop Attacks)

70% of ransomware attempts come from Phishing. Learn how and why attackers use phishing scams to target the enterprise

READ MORE

How Malware Can Easily Defeat Apple’s macOS Security

or the one where we argue why your business really needs antivirus protection

READ MORE

How We Detected a Real Empire Exploit Attack

The post describes an attack that was carried out during a POC at a customer site and handled by the SentinelOne Agent and Vigilance service

READ MORE

macOS Spyware | The Dangers of a Fake CryptoWallet Keylogger

We investigate a macOS keylogger targeting Exodus cryptocurrency asset manager. Learn what to look out for and how to avoid similar spyware attacks

READ MORE

What Is Windows PowerShell (And Could It Be Malicious)?

How can PowerShell impact your business’s valuable assets? Learn the basics of PowerShell, why it’s attractive to hackers & how to protect the enterprise

READ MORE

Inside SearchPageInstaller | macOS Malware Deploys a MITM Attack

We take a closer look at SPI adware, which leverages open-source mitmproxy to intercept traffic and inject ads

READ MORE

2018’s Most Prevalent Ransomware – We Took it for a Ride

Despite determined efforts to neutralize it, GandCrab ransomware has continued to evolve and spread throughout 2018. Watch a demo

READ MORE

macOS Cryptomining Malware on the Rise

A review of the most recent Cryptojacking threats affecting Apple Mac users

READ MORE

Meet Cryptojacking, the (not so) new kid on the block

Cryptomining malware can cripple your endpoints but remains difficult to detect. Here’s what you need to know.

READ MORE