Security

Meltdown/Spectre – A tale of two vendors

The new year erupted with a lot of activity because of Microsoft’s patches to deal with the Meltdown and Spectre vulnerabilities.  Due to concerns about incompatibilities with AVs, Microsoft will release these patches to only those devices which have a specific registry key set. A superficially conservative move, this is going to leave millions of […]

READ MORE

OSX.CpuMeaner: New Cryptocurrency Mining Trojan Targets macOS

(Image source: Beware of traps, by Carmen) In this post, we analyze a new cryptocurrency mining trojan targeting macOS. The malware hides in the pledge to download pirated applications and secretly mines Monero crypto-currency with the user’s hardware. While the idea is similar to OSX.Pwnet, the means and method of implementation are closer to that […]

READ MORE

A macOS Perspective from SentinelOne: Remote Desktop and PuPs

What are PUPs? A PUP is a Potentially Unwanted Program. It is also known as a Potentially Unwanted Application (PUA). PUPs are software with implementations that can compromise privacy or otherwise weaken the security of a computer, a user, or the environment. What is the danger of a PUP? A PUP can cause excessive or […]

READ MORE

Think you can overlook Linux? Think again!

According to recent news a hacker pleaded guilty and was sentenced to 46 months in prison for spreading Linux malware. He admitted that he made profits from a massive Ebury botnet scheme that was associated with thousands of compromised Linux systems. The malware had the capacity to send more than 35 million spam messages and […]

READ MORE

Addressing the Security-Encryption Paradox

Encryption is a critical partner to organizational security. Except when it isn’t! It’s clear that encryption has a key role in ensuring that organizational data stays invisible and protected. Technology giants such as Google are pushing us towards encryption – whether it’s via prioritizing search results[1] or flagging unencrypted sites as unsafe[2]. WordPress, the most […]

READ MORE

OSX.Pwnet.A – CS: GO Hack and Sneaky Miner

(Photo source: Pony Strike: Global Offense by FilipinoNinja95) We recently found a hack for Counter-Strike: Global Offensive on macOS that is also a trojan that could mine CryptoCurrencies without user consent. According to VirusTotal Retrohunt, the threat is in the wild since the beginning of July 2017. Warning: At the time of this writing, all […]

READ MORE

Securing Virtual Desktop Infrastructure (VDI)

The SentinelOne agent is an efficient solution to secure the growing demand for agent virtualization, including thin clients, layered apps, and other VDI scenarios. It does not require updates and is not dependent on signatures or other legacy antivirus features. The SentinelOne offering for VDI includes all protection engines and functionality, the same as we […]

READ MORE

Armory Sandbox – Building a USB analyzer with USB armory

Some time ago a friend received a mysterious USB pen with a note talking about some kind of heavily persistent malware. He had that USB pen stored untouched and of course my curiosity took over. Since one should never plug in unknown USB devices into a computer (well, any USB device we purchase is unknown […]

READ MORE

Practice These 10 Basic Cyber Hygiene Tips for Risk Mitigation

For six years in a row, cybersecurity has been identified as the #1 “problematic shortage” area across all of IT. What’s more concerning is that in 2016 and 2017, there was a dramatic increase in the shortage across organizations. With companies scrambling for cybersecurity personnel, they are also distracted by involvement in an innovation race. […]

READ MORE