Blog

Posted on

Dump the Sandbox

Technology becomes obsolete quickly in a variety of industries as “newer” and “more innovative” options crop up on what feels like an almost daily basis. The same is true for the pace of technological innovation in the information security space. Traditional antivirus vendors spurred on by waning detection rates and unhappy customers have been acquiring […]

READ MORE
Posted on

CVE-2017-0199: What REAL 0-Day Vulnerability Protection Looks Like

News of a Microsoft Word 0-day vulnerability spread like wildfire this week. Discovered by FireEye, the attack uses is executed when a user opens a Word attachment that includes a malicious OLE2 (Object Linking and Embedding) embedded in a specially-crafted Word document that can then spread the Dridex banking Trojan. The 0-day vulnerability, CVE-2017-0199, was […]

READ MORE
Posted on

Malware Analyst’s Guide to Bitcoin

Why Should You Care? Criminals are using Bitcoin and other cryptocurrencies for handling payments for selling stolen data, hacking services such as DDoS, and for ransomware payments. If you want to follow the money and better understand threat actors, you’ll need to understand Bitcoin and how to analyze transactions.bitcoin It’s important to keep up with […]

READ MORE
Posted on

SentinelOne Now Supports Windows Legacy Systems

Not All Operating Systems are Created Equal Last month, at South China University of Technology Guangzhou, China published vulnerabilities in Windows Internet Information Services (IIS 6) web server that affects 600,000 older servers, which likely won’t be patched by Microsoft. Reasons behind why administrators still run the outdated operating systems has mostly to do with […]

READ MORE
Posted on

Windows Shortcut File or .LNK Files Sneaking In Malware

Malicious actors keep us on our toes as they move from executables (.EXE) and scripts files to .LNK file to sneak in their payloads. With email servers routinely configured to reject attachments with file extensions like .exe, .pif, and .com, attackers have gotten more creative with their deception techniques. From Locky to Kovter, the most […]

READ MORE
Posted on

I’m Getting Hacked Where? Your Data Breach Response Checklist

Jeremiah Grossman, our Chief of Security and Strategy here at SentinelOne, has a great piece of advice to increase your security immediately. Know What You’re Protecting. Grossman says, “When a company gets hacked, it’s largely because there’s a computer, a box, a website that they didn’t know they owned.” For small businesses this may be […]

READ MORE
Posted on

What is a CISO? And the 101 on How to Set Them Up for Success

The position of CISO —Chief Information Security Officer— is one of the newest roles ever created in the field of information security. As such, there’s no standard definition of the CISO’s roles and responsibilities. Does the CISO report to the board with the other C-level executives? Do they have their own budget, or do they […]

READ MORE
Posted on

Cyber Security Importance Doesn’t Always Translate in Business

  We hear a lot about cyber security these days, both in the business world and in the public sector, where governments bemoan their less than total control of IT systems. We feel, collectively, that as new crowds of professional and amateur hackers and black hat individuals come out of the woodwork, business and government […]

READ MORE
Posted on

The Anatomy of a DDoS Attack

Distributed denial of service or DDoS attacks are a big deal in today’s cybersecurity world. Time and time again, you’ll hear about a DDoS attack that took down a website or part of a company or government system. So what do these attacks do? What is a DDoS Attack? Behind the fancy name of “distributed […]

READ MORE