Security

Mojave’s security “hardening” | User protections could be bypassed

Any local or remote user can bypass Apple’s new Full Disk Access requirement using ssh. Find out how to stay safe

READ MORE

On the Trail of OSX.FairyTale | Adware Playing at Malware

An adware installer tries its best to avoid detection, but leaves behind more clues than intended

READ MORE

How Ryuk Ransomware Targets AV Solutions, Not Just Your Files

Could malware disable or cripple your endpoint protection? This recent ransomware attack is definitely trying. Watch a demo

READ MORE

Fileless Malware Attacks | How They Can be Detected and Mitigated

In a previous post, we’ve talked about what fileless malware is, how it changes the way we treat cyber threats, and how it affects the enterprise. In this post, we will cover how fileless-based attacks are detected and mitigated by the SentinelOne agent.

READ MORE

How Fileless Malware Changes the Way We Treat Cyber Threats

AV and other endpoint security products have focused on files, but threat actors have turned to fileless malware as a highly effective alternative.

READ MORE

Can Whitelisting Win over Advanced Persistent Threats?

Whitelisting is still popular for securing endpoints. What are the limitations of relying on it to combat threats and APTs?

READ MORE

OSX.Fruitfly recycled | macOS still vulnerable to ‘old’ Perl script

13-years in the wild and counting? macOS is still vulnerable to OSX.Fruitfly, which can easily be repurposed by other bad actors

READ MORE

Malware Identification for Android | Caleb Fenton Talks to Cyber Defenders

SentinelOne researcher, Caleb Fenton was a guest speaker at Cyber Defenders and talked about how Malware is identified in Android applications using Machine Learning and the behavioral heuristics taken into account to do the same

READ MORE

SentinelOne Detects KeyPass Ransomware

KeyPass is a new ransomware threat that has hit at least 20 countries and appears to be spreading still further by means of fake software installers

READ MORE