SentinelLabs Logo RGB WhitePurp
ABOUT
CONTACT
VISIT SENTINELONE.COM
Security & Intelligence

LLMs & Ransomware | An Operational Accelerator, Not a Revolution

LLMs make competent ransomware crews faster and novices more dangerous. The risk is not superintelligent malware, but rather industrialized extortion.

Read More
Malicious Apprentice 6
Security & Intelligence

Malicious Apprentice | How Two Hackers Went From Cisco Academy to Cisco CVEs

Dakota Cary / December 10, 2025

Read how two Cisco Network Academy Cup winners went from students to operators behind Salt Typhoon, a global cyber espionage campaign targeting telecoms.

Read More
Mei Eugenio Ftr 2
LABScon

LABScon25 Replay | Simulation Meets Reality: How China’s Cyber Ranges Fuel Cyber Operations

LABScon / November 25, 2025

Mei Danowski & Eugenio Benincasa unpack how Chinese firms running attack-defense exercises fuel state-linked offensive cyber operations.

Read More
2
Security Research

Threat Hunting Power Up | Enhance Campaign Discovery With Validin and Synapse

Tomas Gatial / November 17, 2025

Accelerate adversary tracking and reveal hidden infrastructure with our open-source Synapse Rapid Power-Up for Validin.

Read More
LCReplay LLM Mw ITW Ftr
LABScon

LABScon25 Replay | LLM-Enabled Malware In the Wild

LABScon / November 3, 2025

Learn how to detect malware that generates code at runtime. SentinelLABS reveals hunting techniques and how to uncover novel AI-enabled threats.

Read More
Phantomcaptcha Ftr2
Adversary

PhantomCaptcha | Multi-Stage WebSocket RAT Targets Ukraine in Single-Day Spearphishing Operation

Tom Hegel / October 22, 2025

SentinelLABS uncovers a coordinated spearphishing campaign targeting organizations critical to Ukraine's war relief efforts.

Read More
Autopoking Ftr
LABScon

LABScon25 Replay | Auto-Poking The Bear: Analytical Tradecraft In The AI Age

LABScon / October 9, 2025

AI agents promise speed, but at what cost to trust? Dreadnode’s Wendiggensen & Palm unpack this dilemma through a hands-on study of leaked Russian data.

Read More
LLM Enabled V2 Ftr
Security Research

Prompts as Code & Embedded Keys | The Hunt for LLM-Enabled Malware

Alex Delamotte, Vitaly Kamluk & Gabriel Bernadett-Shapiro / September 19, 2025

LLM-enabled malware poses new challenges for detection. SentinelLABS presents groundbreaking research on how to hunt for this new class of threats.

Read More
ConInt Validin July2025 Ftr
Adversary

Contagious Interview | North Korean Threat Actors Reveal Plans and Ops by Abusing Cyber Intel Platforms

Aleksandar Milenkoski, Sreekar Madabushi (Validin) & Kenneth Kinion (Validin) / September 4, 2025

DPRK-aligned threat actors abuse CTI platforms to detect infrastructure exposure and scout for new assets.

Read More
Ethereum Drainer Scam
Crimeware

Smart Contract Scams | Ethereum Drainers Pose as Trading Bots to Steal Crypto

Alex Delamotte / August 5, 2025

Crypto scammers use fake YouTube bots, AI videos, and obfuscated smart contracts to steal $900K+, targeting unwary traders.

Read More
PXA1
Advanced Persistent Threat

Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem

Jim Walter, Alex Delamotte, Beazley Security’s Francisco Donoso, Sam Mayers, Tell Hause & Bobby Venal / August 4, 2025

PXA Stealer uses advanced evasion and Telegram C2 to steal global victim data, fueling a thriving cybercrime market.

Read More
Previous
1 2 3 … 24
Next

Search

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

Recent Posts

  • LLMs & Ransomware | An Operational Accelerator, Not a Revolution
    LLMs & Ransomware | An Operational Accelerator, Not a Revolution
    December 15, 2025
  • Malicious Apprentice | How Two Hackers Went From Cisco Academy to Cisco CVEs
    Malicious Apprentice | How Two Hackers Went From Cisco Academy to Cisco CVEs
    December 10, 2025
  • LABScon25 Replay | Simulation Meets Reality: How China’s Cyber Ranges Fuel Cyber Operations
    LABScon25 Replay | Simulation Meets Reality: How China’s Cyber Ranges Fuel Cyber Operations
    November 25, 2025

Labs Categories

  • Crimeware
  • Security Research
  • Advanced Persistent Threat
  • Adversary
  • LABScon
  • Security & Intelligence

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • Malicious Apprentice | How Two Hackers Went From Cisco Academy to Cisco CVEs
    Malicious Apprentice | How Two Hackers Went From Cisco Academy to Cisco CVEs
    December 10, 2025
  • LABScon25 Replay | Simulation Meets Reality: How China’s Cyber Ranges Fuel Cyber Operations
    LABScon25 Replay | Simulation Meets Reality: How China’s Cyber Ranges Fuel Cyber Operations
    November 25, 2025
  • Threat Hunting Power Up | Enhance Campaign Discovery With Validin and Synapse
    Threat Hunting Power Up | Enhance Campaign Discovery With Validin and Synapse
    November 17, 2025

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2025 SentinelOne, All Rights Reserved.