In the first part of our tutorial on macOS malware reverse engineering skills, we found the unpack.txt file containing encrypted code in the Resources folder. In Part 2, we went on to examine the main executable using static analysis techniques to learn more. As a...
Sentinel One News
Category: Sentinel One News
Privacy 2019: Tor, Meek & The Rise And Fall Of Domain Fronting
This post is the first in a series covering privacy, anonymity and security on the internet in recent times, with a focus on real issues affecting people in the real world. Censorship and pervasive state-sponsored surveillance is a daily reality for hundreds of...
Solving Customer Problems (The Ballad of the Sales Engineer)
Proudly coming to you from Nashville Tennessee. This is the frontier podcasts. I'm your host ledge and we are powered by guns. I owe the engineers choice for engineering talent if you like what you hear. Please give us a review on iTunes and join the conversation at...
Cybersecurity Through Art | Yuval Saar, UI/UX Designer
Social media videos have been to thank for discovering some of pop culture's most recognizable figures - from Bieber to Kate Upton, The Weeknd to Shawn Mendes, they are a proven tool for unearthing talent. When it comes to the confines of SentinelOne's Tel Aviv...
How to Reverse Malware on macOS Without Getting Infected | Part 2
In Part 1 of our tutorial on macOS malware reverse engineering skills, we discovered a suspicious file containing encrypted code. Let's continue our investigation of the malware sample in our isolated VM. It's time to introduce static analysis techniques and the...
Have you heard? CRN Named SentinelOne One of the Coolest Endpoint Security Vendors
According to recent recognitions from CRN, our channel program is on fire - and we couldn't agree more. This year alone, SentinelOne was included in the 2019 CRN Partner Program Guide, named one of the 20 Coolest Endpoint Security Vendors from the CRN Security 100...
How to Reverse Malware on macOS Without Getting Infected | Part 1
Resources for learning malware analysis and reverse engineering abound for the Windows platform and PE files, but by comparison there's very little literature or tutorials for those who want to learn specifically about how to reverse macOS malware and macOS malware...
Ursnif – A Polymorphic Delivery Mechanism Explained
The Ursnif trojan, which has been around in various forms for quite a few years now, remains extremely active and clearly still under active development. While there's been plenty of technical analyses of the malware and its payloads, less has been written about the...
Reach Me
Request a Call Back by filling out and submitting the following form.








