ALL YOUR FILES ARE ENCRYPTED BY RAPID 2.0 RANSOMWARE - Unless you have SentinelOne

“ALL YOUR FILES ARE ENCRYPTED” – Unless set to Russian Locale

| | security
While it is now common-place to see malware attempting to evade detection by security solutions, it’s rarer to see malware avoiding victims The post “ALL YOUR FILES ARE ENCRYPTED” – Unless set to Russian Locale appeared first on SentinelOne ... Read More
Implementing a Proactive Approach for Securing your Assets

Implementing a Proactive Approach for Securing your Assets

| | Product/Technology
No one Wants to be Reactive When it Comes to Security, but what can CISOs do? Check out ways to stay ahead of the game The post Implementing a Proactive Approach for Securing your Assets appeared first on SentinelOne ... Read More
Demo | SentinelOne Detects Hancitor Trojan

Hancitor Banking Trojan is Back | Using Malicious Word Attachment

| | security
The Hancitor trojan, also known as Chanitor, is a downloader first observed in 2014. Back then, it distributed its payload via a Microsoft Word document email attachment with embedded malicious macros. Over the years, several flavors have been seen in the wild using a variety of infection techniques. A few ... Read More
SentinelOne Prevents Malware Embedded in Microsoft Office Documents | DDE Exploit

Malware Embedded in Microsoft Office Documents | DDE Exploit (MACROLESS)

| | security
Hiding malicious code within a macro is a malware technique well-known among attackers and defenders, and even end-users have heard the message that they need to take care when opening documents from unknown sources that contain macros. Many enterprises implement a blocking policy for macros or strip VBA code found ... Read More
5 Shortcuts to Speed Up Your Endpoint Security Management Process

5 Shortcuts to Speed Up Your Endpoint Security Management Process

| | Product/Technology
As a SecOps professional, you likely spend a good chunk of the day managing your endpoint assets and ensuring they are secured. We understand the challenge. Managing endpoint security can be a time-consuming process. So we’re here to help! In this post, I’ll be sharing some ways you can save ... Read More
SentinelOne Vmware VDI Demo

6 Key Factors When Choosing VDI Security

| | Product/Technology
In recent years, VDI (Virtual Desktop Infrastructure) implementations have become more common than ever before. VDI hasn’t replaced the entire desktop market as some predicted, but more and more enterprises have adopted VDI environments due to a variety of operational benefits. According to Gartner[1], large enterprises adopting VDI at high ... Read More