• ABOUT
  • CONTACT
  • VISIT SENTINELONE.COM
Back
  • ABOUT
  • CONTACT
  • VISIT SENTINELONE.COM
Crimeware

CrateDepression | Rust Supply-Chain Attack Infects Cloud CI Pipelines with Go Malware

Software developers using GitLab CI are being targeted with malware through a typosquatting attack, putting downstream users at risk.

Read More
Security Research

Putting Things in Context | Timelining Threat Campaigns

Tom Hegel / May 11, 2022

Visualizing data is integral to threat research. See how we used this timeline analysis tool to track activity in the Ukrainian cyber conflict.

Read More
Security Research

Vulnerabilities in Avast And AVG Put Millions At Risk

Kasif Dekel / May 5, 2022

Two high-severity flaws in popular end user security tools allow attackers to elevate privileges and compromise devices.

Read More
Adversary

Moshen Dragon’s Triad-and-Error Approach | Abusing Security Software to Sideload PlugX and ShadowPad

Joey Chen / May 2, 2022

Chinese-aligned APT group Moshen Dragon caught sideloading malware through multiple AV products to infect telecoms sector.

Read More
Crimeware

LockBit Ransomware Side-loads Cobalt Strike Beacon with Legitimate VMware Utility

James Haughom / April 27, 2022

Long-running LockBit ransomware attempts to evade Windows ETW, AMSI and EDR by leveraging legitimate VMware logging command line utility.

Read More
Crimeware

Nokoyawa Ransomware | New Karma/Nemty Variant Wears Thin Disguise

Antonis Terefos / April 21, 2022

Nemty developers have created a new, flawed update to the Karma ransomware variant in a bid to avoid detection and mislead attribution.

Read More
Security Research

Inside the Black Box | How We Fuzzed Microsoft Defender for IoT and Found Multiple Vulnerabilities

Kasif Dekel / April 13, 2022

A must-read for fuzzing fans, this post gives a detailed look at the advanced techniques used in our recent discovery of multiple bugs in Defender for IoT.

Read More
Adversary

AcidRain | A Modem Wiper Rains Down on Europe

Juan Andrés Guerrero-Saade / March 31, 2022

As the most impactful cyber attack of the Ukrainian invasion gets downplayed, SentinelLabs uncovers a more plausible explanation.

Read More
Security Research

Pwning Microsoft Azure Defender for IoT | Multiple Flaws Allow Remote Code Execution for All

Kasif Dekel / March 28, 2022

As if IoT & OT aren't hard enough to defend, we dive into five critical vulnerabilities in Microsoft Defender for IoT that leave the door wide open.

Read More
Adversary

Chinese Threat Actor Scarab Targeting Ukraine

Tom Hegel / March 24, 2022

Chinese threat actor Scarab is targeting Ukrainian organizations. In this report, we share technical details and IOCs on attacks over the past two years.

Read More
Previous
1 2 3 … 14
Next

Search

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

Recent Posts

  • CrateDepression | Rust Supply-Chain Attack Infects Cloud CI Pipelines with Go Malware
    CrateDepression | Rust Supply-Chain Attack Infects Cloud CI Pipelines with Go Malware
    May 19, 2022
  • Putting Things in Context | Timelining Threat Campaigns
    Putting Things in Context | Timelining Threat Campaigns
    May 11, 2022
  • Vulnerabilities in Avast And AVG Put Millions At Risk
    Vulnerabilities in Avast And AVG Put Millions At Risk
    May 5, 2022

Labs Categories

  • Security Research
  • Crimeware
  • Security & Intelligence
  • Adversary
  • Advanced Persistent Threat

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Latest Tweet

  • We just released a research on a supply-chain attack against the Rust development community. We referred to it as… https://t.co/T6T3Cp5cWa3 days ago
  • The Centre for Cybersecurity Belgium (CCB) kindly invites you to its online CCB Share & Connect event – previousl… https://t.co/7yoL03kHyp20 days ago
  • New on #SentinelLabs! We have disclosed 10.0 CVSS vulnerabilities on Microsoft’s Azure Defender for IoT allowing u… https://t.co/cEnYqccXrV54 days ago
  • RT @VentureBeat: Five critical vulnerabilities in #Microsoft Azure Defender for #IoT could result in "full network compromise," researchers…54 days ago

Recent Posts

  • Putting Things in Context | Timelining Threat Campaigns
    Putting Things in Context | Timelining Threat Campaigns
    May 11, 2022
  • Vulnerabilities in Avast And AVG Put Millions At Risk
    Vulnerabilities in Avast And AVG Put Millions At Risk
    May 5, 2022
  • Moshen Dragon’s Triad-and-Error Approach | Abusing Security Software to Sideload PlugX and ShadowPad
    Moshen Dragon’s Triad-and-Error Approach | Abusing Security Software to Sideload PlugX and ShadowPad
    May 2, 2022

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2022 SentinelOne, All Rights Reserved.