The Good, the Bad and the Ugly in Cybersecurity – Week 15 SentinelOne Blog 4 days 3 hours ago FBI disrupts GRU router hijacking operation, ClickFix sidesteps Apple's Terminal mitigation, and Iranian actors exploit PLCs across U.S. infrastructure. SentinelOne
Edge Decay: How a Failing Perimeter Is Fueling Modern Intrusions SentinelOne Blog 5 days 3 hours ago Edge devices are prime targets — learn how attackers exploit the perimeter to gain access, persist, and pivot to identity. SentinelOne
The Good, the Bad and the Ugly in Cybersecurity – Week 14 SentinelOne Blog 1 week 4 days ago SentinelOne stops LiteLLM supply chain attack in real time, attackers weaponize Axios to deploy RAT, and Chrome zero-day enables RCE. SentinelOne
Securing the Supply Chain: How SentinelOne®’s AI EDR Stops the Axios Attack Autonomously SentinelOne Blog 1 week 4 days ago Read our blog post to learn how SentinelOne’s AI EDR autonomously stopped a global LiteLLM supply chain attack before execution. SentinelOne
The Identity Paradox: The Hidden Risks in Your Valid Credentials SentinelOne Blog 1 week 5 days ago Identity attacks are rising as trust expands — learn how to detect misuse, close gaps, and defend beyond authentication. SentinelOne
The Implementation Blind Spot | Why Organizations Are Confusing Temporary Friction with Permanent Safety SentinelOne Blog 1 week 6 days ago Our new blog post explores the ‘cognitive rust belt’ — how AI friction masks skill loss and why organizations must act now. Chris St. Myers
How SentinelOne’s AI EDR Autonomously Discovered and Stopped Anthropic’s Claude from Executing a Zero Day Supply Chain Attack, Globally SentinelOne Blog 1 week 6 days ago Read our blog post to learn how SentinelOne’s AI EDR autonomously stopped a global LiteLLM supply chain attack before execution. SentinelOne
The Good, the Bad and the Ugly in Cybersecurity – Week 13 SentinelOne Blog 2 weeks 4 days ago Alleged RedLine operator faces 30 years, FAUX#ELEVATE compromises enterprises in 30 seconds, and TeamPCP launches cascading supply chain attacks. SentinelOne
The Good, the Bad and the Ugly in Cybersecurity – Week 12 SentinelOne Blog 3 weeks 4 days ago Interpol disrupts cybercrime networks, DarkSword steals iOS personal data, and Interlock exploits Cisco 0-day to breach enterprise firewalls. SentinelOne
The Good, the Bad and the Ugly in Cybersecurity – Week 11 SentinelOne Blog 1 month ago Ransomware negotiator charged with aiding BlackCat, actors exploit FortiGate firewalls to breach networks, and Iran hacktivists wipe Stryker systems. SentinelOne
FortiGate Edge Intrusions | Stolen Service Accounts Lead to Rogue Workstations and Deep AD Compromise SentinelOne Blog 1 month ago FortiGate SSO flaws allows attackers to steal configs, abuse AD creds, deploy RMM tools, and exfiltrate NTDS files. Alex Delamotte, Stephen Bromfield, Mary Braden Murphy & Amey Patne
The Good, the Bad and the Ugly in Cybersecurity – Week 10 SentinelOne Blog 1 month 1 week ago Authorities seize Tycoon2FA & LeakBase, researchers expose Coruna iOS exploits, and hacktivists launch DDoS attacks after U.S.-Israel strikes. SentinelOne
SentinelOne Intelligence Brief: Iranian Cyber Activity Outlook SentinelOne Blog 1 month 1 week ago Iran-linked cyber activity may surge after strikes, targeting US and Israeli sectors; SentinelOne provides intel and urges vigilance. SentinelOne
The Good, the Bad and the Ugly in Cybersecurity – Week 9 SentinelOne Blog 1 month 2 weeks ago Authorities convict malicious insider, MuddyWater spreads malware in MENA, and Cisco SD-WAN flaw exposes critical networks to attackers. SentinelOne
From Access to Execution: Securing Identity in the Age of Autonomous Agents SentinelOne Blog 1 month 2 weeks ago SentinelOne secures human and non-human identities with continuous behavioral validation across AI, browsers, and endpoints. Arijeet Ghatak
The Good, the Bad and the Ugly in Cybersecurity – Week 8 SentinelOne Blog 1 month 3 weeks ago Authorities arrest hundreds of financial scammers, threat actors target Iran protest supporters, and infostealers exfiltrate OpenClaw secrets. SentinelOne
OneClaw: Discovery and Observability for the Agentic Era SentinelOne Blog 1 month 3 weeks ago Prompt Security from SentinelOne turns hidden agent activity into clear, actionable governance intelligence with the release of OneClaw. SentinelOne
Shadow Agents: How SentinelOne Secures the AI Tools That Act Like Users SentinelOne Blog 1 month 3 weeks ago SentinelOne secures AI from infrastructure to agents, delivering visibility, governance, and control at scale. SentinelOne
The Good, the Bad and the Ugly in Cybersecurity – Week 7 SentinelOne Blog 2 months ago Authorities crack down on global cyber scams, state-backed APTs weaponize Gemini AI for attacks, and PRC-based UNC3886 targets major telcoms. SentinelOne
ClawSec: Hardening OpenClaw Agents from the Inside Out SentinelOne Blog 2 months ago Learn about how ClawSec, by Prompt Security, secures OpenClaw agents, stopping malicious skills with zero-trust defenses. SentinelOne