To cope with today’s fileless endpoint attacks – especially those that aren’t precisely similar to previously known exploits – Tomer Weingarten and Nicholas Warner discuss a unified EPP/EDR approach that includes visibility into the dangers lurking within encrypted network traffic.
For more details, check out SentinelOne recent whitepaper: Fileless Malware | Adversaries Quick Win
Related read
Windows Security
“ALL YOUR FILES ARE ENCRYPTED” – Unless set to Russian Locale
New Windows 10 File Type Can Be Abused for Running Malicious Applications
Hancitor Banking Trojan is Back | Using Malicious Word Attachment
SentinelOne Detects and Blocks New Variant of Powershell CryptoWorm
MacOS Security
Calisto Detected installing Backdoor on macOS
The Weakest Link: When Admins Get Phished | MacOS “OSX.Dummy” Malware
OSX.CpuMeaner: New Cryptocurrency Mining Trojan Targets MacOS
Linux Security
Drupal Exploit on Linux – SentinelOne Detection and Response Case Study
SentinelOne Releases Free Linux Tool to Detect Meltdown Vulnerability Exploitations
Guides
Implementing a Proactive Approach for Securing your Assets
5 Shortcuts to Speed Up Your Endpoint Security Management Process