Category: EN

North Korean Hackers Posed as Job Recruiters and Seekers

Two ongoing efforts, Contagious Interview and Wagemole, have been identified to target job-seeking activities connected to North Korean Hackers and state-sponsored threat actors. Threat actors use the interview process in “Contagious Interview” to trick developers into installing malware by posing…

Integration Spotlight: Stellar Cyber Open XDR

By integrating D3 Smart SOAR (Security Orchestration, Automation, and Response) with Stellar Cyber Open XDR, organizations can create a seamless incident response workflow that minimizes time to contain and enables better decision-making. This article outlines how the integration works and…

Insights from SentinelOne’s OneCon23

Earlier in the month I had the chance to attend OneCon, SentinelOne’s first ever customer conference in Boca Raton, Florida. This event was a pleasure to be at, not least as the Florida weather in November is considerably better than…

Microsoft announces Defender bug bounty program

Microsoft has announced a new bug bounty program aimed at unearthing vulnerabilities in Defender-related products and services, and is offering participants the possibility to earn up to $20,000 for the most critical bugs. The Microsoft Defender bug bounty program Microsoft…

AI Solutions Are the New Shadow IT

Ambitious Employees Tout New AI Tools, Ignore Serious SaaS Security RisksLike the SaaS shadow IT of the past, AI is placing CISOs and cybersecurity teams in a tough but familiar spot.  Employees are covertly using AI with little regard for established IT and…