A new threat cluster has been targeting telecommunication providers in the Middle East and abusing Microsoft, Google and Dropbox cloud services.| SentinelOne
Learn how Modern EDR leverages AI, automation, and proactive defense to outpace threats and empower efficient endpoint security.| SentinelOne
DoJ busts $100M fraud ring, Curly COMrades hit Georgia and Moldova with MucorAgent, and a new MadeYouReset DoS flaw emerges.| SentinelOne
U.S. seizes millions in illicit assets, YouTube crypto scams drain $900K in BTC, and SonicWall investigates a 0-day enabling Akira ransomware.| SentinelOne
SentinelOne's AI-powered FORGE evolves detection rules to stop modern cyber threats with speed, precision, and minimal false positives.| SentinelOne
Learn the risks, benefits, and best practices of container security scanning to safeguard your applications from vulnerabilities.| SentinelOne
Understanding attack surface reduction is paramount for digital defense strategies against cyber threats. Identity is a primary attack for threat actors.| SentinelOne
Singularity™ Network Discovery is a cloud-delivered, software-defined network discovery solution designed to add global visibility and control with minimal friction.| SentinelOne
Singularity™ Identity Detection & Response for Active Directory and Entra ID provides real-time infrastructure defense against identity-based attacks.| SentinelOne
Increase cybersecurity efficiency with one unified, AI-powered control plane that scales autonomous protection across the enterprise. Discover SentinelOne Purple AI Today!| SentinelOne
Here’s how SentinelOne's Purple AI delivers 338% three-year ROI, faster threat detection, and leaner SecOps in this in-depth IDC analyst report.| SentinelOne
Learn about autonomous SOC and how SentinelOne uses a maturity model to frame the shifts it will bring to day-to-day security operations.| SentinelOne
SentinelOne acquires Prompt Security to deliver real-time AI visibility, control, and protection across enterprises. Learn more in this blog.| SentinelOne
FBI seizes ransomware Bitcoin, SentinelLABS exposes Hafnium’s spying tools, Secret Blizzard hijacks Moscow ISPs for embassy surveillance.| SentinelOne
SentinelOne has, once again, been named an MDR leader for AI-driven detection, response, and expert analyst collaboration at global scale.| SentinelOne
Is your AI in security real or just noise? Learn how to cut hype, boost speed, and prove value with measurable SOC outcomes.| SentinelOne
PXA Stealer uses advanced evasion and Telegram C2 to steal global victim data, fueling a thriving cybercrime market.| SentinelOne
Threat actors abused Visual Studio Code and Microsoft Azure infrastructure to target large business-to-business IT service providers in Southern Europe.| SentinelOne
SentinelLABS has identified multiple deceptive websites linked to businesses in China fronting for North Korea's fake IT workers scheme.| SentinelOne
Threat actors in the cyberespionage ecosystem are using ransomware for financial gain, disruption, distraction, misattribution, and the removal of evidence.| SentinelOne
black basta ransomware demands hefty payouts while threatening public data leaks. Find out its approach and how to stay one step ahead.| SentinelOne
Authorities release a free ransomware decryptor, Lumma infostealer regroups post-takedown, and ToolShell zero-day spurs urgent patching.| SentinelOne
Read up on how to defend against ToolShell, the latest SharePoint critical vulnerability affecting on-premises SharePoint servers.| SentinelOne
SentinelOne shares distinct attack clusters and a detailed timeline of events on an active exploit of the ToolShell 0-day in MS SharePoint.| SentinelOne
A stealthy MaaS infostealer exfiltrating browser, crypto, and system data, Katz Stealer is enabling full campaign control for threat actors.| SentinelOne
Global authorities disrupt nation-state actors, ZuRu malware backdoors macOS, and DoNot Team spies on European targets via LoptikMod RAT.| SentinelOne
Learn about all the new malware targeting macOS in 2021, and the changing tactics, techniques and procedures being employed by threat actors.| SentinelOne
ZuRu malware continues to prey on macOS users seeking legitimate business tools, adapting its loader and C2 techniques to backdoor its targets.| SentinelOne
SentinelOne's blog offers the latest news around cybersecurity, risk reduction, threat intelligence, and more. Sign up for our weekly digest to stay updated.| SentinelOne
Law enforcement seizes Lumma infrastructure, threat actor exploits cloud subdomains to spread malware, and Russia's GRU targets Ukraine aid efforts.| SentinelOne
SentinelOne unifies AI-powered endpoint, cloud, identity, and data protection—enhanced by our Security Data Lake for seamless and efficient cybersecurity.| SentinelOne
Protect your enterprise from ransomware, malware, and cybersecurity threats. Deploy our AI-powered cybersecurity across endpoints, containers, cloud workloads, and IoT devices in a single autonomous XDR platform.| SentinelOne
As the most impactful cyber attack of the Ukrainian invasion gets downplayed, SentinelLabs uncovers a more plausible explanation.| SentinelOne
Stop threats faster and with greater accuracy. Connect with a SentinelOne expert to see the world’s most advanced cybersecurity platform.| SentinelOne
SentinelOne's guide on Distributed Denial of Service (DDoS). Learn about it's Causes, Attack Types, Examples, Differences from DoS, and Protective Measures.| SentinelOne
Learn what Zero Trust Architecture (ZTA) is, its core principles, benefits, and best practices. Explore use cases and how it enhances security.| SentinelOne
Explore the complexities of Multi-Cloud Security, uncovering challenges, solutions, and real-world examples to fortify your cloud environments.| SentinelOne
This article will help you understand the top 10 Cloud Security Breaches your organization could face and how to effectively mitigate these.| SentinelOne
This blog post serves as a deep dive into Cloud Security Auditing, shedding light on its importance, methodologies, and the best ways to go about it.| SentinelOne
Navigate SentinelOne's Cloud Security 101 content for the latest trends and insights to secure your cloud workloads, containers, VMs, databases, and more.| SentinelOne
Explore the 10 cybersecurity trends for 2025, their industry impact, challenges, and how to prepare for evolving security needs.| SentinelOne
Experience the future with the SentinelOne platform: the pinnacle of autonomous cybersecurity. Dive into solutions designed for modern threats. Try it now!| SentinelOne
Contact SentinelOne today to learn more about our autonomous cybersecurity. SentinelOne provides endpoint, cloud, & identity protection for any enterprise| SentinelOne
This report highlights a rarely-discussed but crucially important attack surface: security vendors themselves.| SentinelOne
Read SentinelOne's response to the Executive Order dated April 9, 2025 here.| SentinelOne
Leading AI-powered protection, detection, and response capabilities across endpoints, identities, and more| SentinelOne
Deploy AI-powered protection by SentinelOne, combining CSPM, CWPP, CDR, CIEM, DSPM, and more for real-time cloud security.| SentinelOne
Explore SentinelOne’s industry-leading capabilities in the 2024 MITRE ATT&CK® Evaluations: Enterprise & see what makes us a Leader in cybersecurity.| SentinelOne
SentinelOne is named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. See what makes us a Leader in cybersecurity.| SentinelOne
Explore 50+ cloud security statistics for 2025, covering misconfigurations, breaches, challenges, audits, and the zero trust approach.| SentinelOne
DPRK 'Contagious Interview' campaign continues to target Mac users with new variants of FERRET malware and GitHub devs with repo spam.| SentinelOne
LABScon | SentinelOne
SentinelLabs has observed a suspected DPRK threat actor targeting Crypto-related businesses with novel multi-stage malware.| SentinelOne
Threat actors leverage cloud services to conduct massive smishing campaign through AWS Simple Notification Service.| SentinelOne
A sophisticated new toolset is being used to harvest credentials from multiple cloud service providers, including AWS SES and Microsoft Office 365.| SentinelOne
Supplying a custom backdoor to a cluster of APT groups, the personas behind ShadowPad have maintained a cloak of secrecy, until now.| SentinelOne
SentinelLABS has discovered a novel malware variant of AcidRain that could be targeting telecoms networks in Ukraine.| SentinelOne