The cybersecurity skills shortage is a pressing concern for businesses, with the current shortfall estimated to be around 2 million unfilled positions, a number that is expected to rise to around 3.5 million by 2021. If there's an upside to this shortage, it is that...
Sentinel One News
Category: Sentinel One News
Hiding Code Inside Images: How Malware Uses Steganography
As many Facebook users discovered this week when a partial outage revealed the hidden image tags attached to users' pictures, images can carry a lot of data that's normally invisible to the human eye. The kind of metadata associated with Facebook and Instagram...
What Is Threat Hunting? (And Is It Really Necessary?)
An active EDR solution will protect your network and endpoints against most threats, but no one can claim a security solution is 100% guaranteed to stop every attack. A determined hacker or threat actor that specifically targets an organization will usually have spent...
MacOS Malware Outbreaks 2019 | The First 6 Months
Since we did our end of year review of macOS malware last December, we've seen an uptick in the number of new macOS malware outbreaks. New variants of old families, updated with fresh tricks as well as some novel malware never-before seen in the wild, both...
Phishing | Revealing The Most Vulnerable Targets
Phishing and spearphishing remain the two most widely used vectors for network security breaches, business email compromises and other enterprise security issues. With the number of reported email phishing attacks up for the third quarter in a row, the problem is only...
How Two Firefox Zero Days Led to Two macOS Backdoors
Last week was a busy week for macOS malware. Along with a Gatekeeper POC being deployed in the wild only days after being published and a hulking 2.5GB cryptominer on the loose stealing resources from those tempted by pirate software, there was also the big reveal of...
Linux Admins! Grab Our Free Tool To Protect Against Netflix SACK Panic
Linux admins are being urged to check for and patch three TCP networking vulnerabilities discovered by Netflix researchers. While patches have been made available, testing patches against a full stack of software applications can sometimes be a lengthy process. Given...
How Malware Is Living Off the Land with CertUtil
Despite the variety and creativity of threat actors, we know that they are restricted by their goals. These include things like persistence, exfiltration, and perhaps most importantly, stealth. Even ransomware, which by definition needs to announce itself in order to...
Reach Me
Request a Call Back by filling out and submitting the following form.








