π₯ π New research from @morecoffeeplz.bsky.social
and @silascutler.bsky.social on the "silent" AI network, a massive, unmanaged layer of open-source AI infrastructure operating in the shadows.
π₯ π New research from @morecoffeeplz.bsky.social
and @silascutler.bsky.social on the "silent" AI network, a massive, unmanaged layer of open-source AI infrastructure operating in the shadows.
β
#LLM literacy is table stakes for defenders, CTI analysts, and #cybersecurity professionals of all stripes now.
Still looking for a way into this complex field? π€
LABS has got you covered!
Start here:
s1.ai/inside-llm-1
@sentinelone.com
π₯ New Research from @hegel.bsky.social π₯
PhantomCaptcha: A short-lived, multi-stage PowerShell and WebSocket RAT operation targeting Ukraine-linked humanitarian and government entities.
Full report: s1.ai/pcapt
π₯π₯ Fresh research drop live from #labscon Arizona. @alex.leetnoob.com and @morecoffeeplz.bsky.social with @vkamluk.bsky.social
The Hunt for LLM-enabled malware #ai #cyber #threatintel
s1.ai/llm-mw
Reddit AMA with our very own @dakotaindc.bsky.socialβask him anything here: www.reddit.com/r/geopolitic...
π¨New research drop: Contagious Interview | North Korean Threat Actors Reveal Plans and Ops by Abusing Cyber Intel Platforms
It was a pleasure collaborating with Sreekar Madabushi and @kennethkinion.bsky.social from Validin!
Read our blog post: s1.ai/nk-ops
π Bragging rights, a $100K Prize Pool, and an all-expenses-paid trip to SentinelOneβs OneCon conference in Las Vegas. π° Step up, test your skills, and claim your crown π
Sign up below (includes details on terms and conditions):
The Cyber Patents China Didnβt Want Us to Find: @dakotaindc.bsky.social and @sentinellabs.bsky.social uncovered 10+ patents for highly intrusive forensics and data collection toolsβfiled by companies named in U.S. gov't. indictments for working with the Chinese Hafnium (aka Silk Typhoon) APT group.
π₯ Fresh from the LABS team and our friends at Beazley Security πhttps://www.sentinelone.com/labs/ghost-in-the-zip-new-pxa-stealer-and-its-telegram-powered-ecosystem/
Our team collaborated with our friends at @sentinellabs.bsky.social to identify and disrupt a PXA infostealer campaign that has an intricate and complex delivery chain:
labs.beazley.security/articles/gho...
Thanks for the fantastic collab SentinelLabs team!
ππ₯β¦ the complex relationship btw CN APTsπ΅οΈββοΈ and CN PSOAs π¨π³ makes attribution even more challenging than defenders might have supposed. #cti #threatintel #hafnium #silktyphoon @dakotaindc.bsky.social
www.sentinelone.com/labs/chinas-...
This week's show is YouTube ready @craiu.bsky.social @jags.bsky.social
π₯ Microsoft Sharepoint security crisis: Faulty patches, Toolshell zero-days
youtu.be/3GJuVGmpexA
β οΈ #0-DAY #Microsoft
πΎ #CVE-2025-53770
π© #ToolShell πͺ
bsky.app/profile/sent...
π Apple: βmacOS is secure by design.β
π» Meanwhile, in /Users/Shared:
π΅οΈββοΈ Persistent Malware masquerading as Apple βagentβ
>> Khepri beacon in /tmp
π¦ Ad-hoc signed payloads
π Targeting Chinese diaspora
Deep dive from Dinesh Devadoss and me π s1.ai/zuru
#icymi #macOS #malware #APT #infosec
π₯ Fresh from LABS @philofishal.bsky.social and @syrion89.bsky.social
Our guys untangle the knots of #NimDoor: compiled Nim, macOS process injection and signals-based persistence triggers, with AppleScript (βοΈ) beacons (whatever will they think up next π
) πΆοΈπΆοΈ.
#dprk #apt #macOS
s1.ai/nimdoor
This week's show is a three-hour deep dive into Predatory Sparrow and the long-simmering Iran-Israel cyberwar (with @darkcell.bsky.social @craiu.bsky.social @jags.bsky.social youtu.be/MKKzHseTUUQ?...
"The best netflow comes from asking friends for favors." -- @jags.bsky.social @craiu.bsky.social
Get the full story here:
www.sentinelone.com/labs/follow-... [2/2]
We just released our findings on long-term activity clusters attributed to China-nexus actors.
We discuss a relatively underreported, yet critical, aspect of the threat landscape: the targeting of cybersecurity vendors.
Big shout out to Lumen's Black Lotus Labs for their support! [1/2]
From PhD work to award-winning cybercrime research, @milenkowski.bsky.social of SentinelLABS is a force in malware analysis.
Catch his talk at #SLEUTHCON 2025!
ποΈ Grab your ticket today >>> www.sleuthcon.com
#CyberThreatIntel #InfosecEvents
Love when we can talk about hoy dynamic the threat landscape actually is. The scope and scale of the DPRK IT workers effort alone surprised me as we worked it. Also love @sentinelone.com let us discuss this openly and viewed it as important to do so.
www.sentinelone.com/labs/top-tie...
Appreciate the shoutout @jags.bsky.social (and that you aced my last name)! If you donβt listen to the Three Buddy Podcast yet, it is absolutely amazing and you should!
open.spotify.com/show/6dXbRag...
At @pivotcon.bsky.social, I'm presenting with @hegel.bsky.social and Sreekar Madabushi on the first public look at the full scope of a stealthy, long-running phishing network.
Very excited to share that Iβll be presenting at @sleuthcon.bsky.social in June!
Jim & I will share the backstory behind AkiraBot that didnβt make it into the blogβand what theyβve been up to since.
Published a new Pharos report today - and learned a lot in the process from @milenkowski.bsky.social Jiro, @julianferdinand.bsky.social @tgrossman.bsky.social. The report takes a closer look at how states are using ransomware.
virtual-routes.org/wp-content/u...
π s1.ai/akirabot
#OpenAI abused by spambot to carve out custom messages and beat CAPTCHAs. #security
@alex.leetnoob.com πΈοΈ
it feels like an useful feature so I have just implemented it under aflmc. thanks for sharing your alias! github.com/radareorg/ra...