What is the one common denominator against any adversary? What is the most precious commodity of all in the struggle between attackers and defenders? What is the one advantage the adversary has, up till now, always had over us? The answer is time itself. The reason...
Sentinel One News
Category: Sentinel One News
The Good, the Bad and the Ugly in Cybersecurity – Week 35
The Good Apple, Microsoft and now Google have all made important announcements about new and extended bug bounty programs recently. This week, Google took their turn in announcing a new program to reward the reporting of data abuse issues in Android apps, Chrome...
Gootkit Banking Trojan | Part 2: Persistence & Other Capabilities
Following on from the previous post, Daniel continues exploring the Gootkit banking trojan, revealing its persistence techniques and other capabilities. The Gootkit Banking Trojan was discovered back in 2014, and utilizes the Node.JS library to perform a range of...
macOS Incident Response | Part 2: User Data, Activity and Behavior
In the previous post in this intro series on macOS Incident Response, we looked at collecting device, file and system data. Today, in the second post we're going to take a look at retrieving data on user activity and behavior. Why Investigate User Behavior? There's a...
Our Take: SentinelOne Placed Furthest for Completeness of Vision Within the Visionaries Quadrant
"Keep your eyes on the stars and your feet on the ground." - Franklin D. Roosevelt Your Success is the Reason for Our Success SentinelOne is proud to be recognized by Gartner as a Visionary in the Magic Quadrant for Endpoint Protection Platforms. This year, we're...
Taking Web Animations One Step Further With Powerful S1-Lottie
We're taking SentinelOne's Management console one step further using the powerful S1-Lottie to create great web animations and improve the overall experience across our web platform. The SentinelOne frontend group appreciates the value of great user experience.?...
The Good, the Bad and the Ugly in Cybersecurity – Week 34
The Good It's common knowledge that threat actors are going after the lucrative target of payment systems. The most popular attack today is ATM cash out, ending in money withdrawn. To combat this increasing threat, Visa have announced improved measures to combat fraud...
Insider Threats | From Malicious to Unintentional
In this post, SCB's Principal Security Consultant Tal Eliyahu discusses the case for changing our perception of the threat of malicious insiders. Simple human error is far more likely to be the cause in many cases, he argues. What is an Unintentional Insider Threat?...
Reach Me
Request a Call Back by filling out and submitting the following form.








