Announcing SentinelOne Nexus Embedded AI SDK!

Announcing SentinelOne Nexus Embedded AI SDK!

| | Product/Technology
Nexus Embedded AI SDK is an embeddable AI-based technology that uses SentinelOne’s predictive models to classify files as benign or malicious based on their characteristics and without using signature or cloud lookup. It’s now available as GA! ... Read More
Now On Stage! Deep Hooks: Monitoring Native Execution In WOW64 Applications

Now On Stage! Deep Hooks: Monitoring Native Execution In WOW64 Applications

| | security
After presenting the research on WOW64 applications and how to protect them, Yarden Shafir and Assaf Carlsbad SentinelOne researchers presented on BSidesTLV. Watch it now ... Read More
New Windows 10 File Type Can Be Abused for Running Malicious Applications

New Windows 10 File Type Can Be Abused for Running Malicious Applications

| | security
SettingContent-ms File Type A new file type introduced in Windows 10 in 2015 can be abused for running malicious applications, said Matt Nelson, a security researcher for SpecterOps. The risk is that hackers may exploit the file format to bypass OS defences and run arbitrary and malicious code. This file ... Read More
Drupal Exploit on Linux – SentinelOne Detection and Response Case Study

Drupal Exploit on Linux – SentinelOne Detection and Response Case Study

| | security
Introduction SentinelOne Vigilance is a managed service provided by a group of highly trained cyber security analysts. It offers another layer of security to IT teams by accelerating the detection, prioritization, and response to advanced cyber threats and reducing the risk of missing a critical alert that goes undetected. The ... Read More
SentinelOne detects a new malicious PDF exploit

SentinelOne Detects New Malicious PDF File

| | security
Documents have always been a popular attack vector. Documents, unlike executables, have been traditionally considered less suspicious and harmful. This concept made it easier for attackers using them to circumvent traditional security solutions. But, over time and with the growing scripting and macro capabilities, documents became much more similar to ... Read More