Twitter | Search | |
SentinelOne
ONE autonomous platform to prevent, detect, respond, and hunt. Do more, save time, secure your enterprise: 🐱‍💻
9,614
Tweets
1,326
Following
9,301
Followers
Tweets
SentinelOne 3h
💡The innovation behind 's attack storyline! If you are interested to know more about how we built our storyline UI, check out the latest R&D post, by
Reply Retweet Like
SentinelOne retweeted
stealthtaco 10h
Top half of my new dashboard, still working out what I want to see. I have client/OS stuff further down - and I'm not done with my org's deployment yet.
Reply Retweet Like
SentinelOne 6h
🕵️ The 1st step in a targeted attack is gathering on the target. Let's see what OSINT is all about & how you can learn to use tools to better understand your own digital footprint.
Reply Retweet Like
SentinelOne 7h
❗ Swamped with alerts, analysts need to assemble data into a meaningful story. With , this work is instead done autonomously. The stories are already assembled, so the security analyst can save time and focus on what matters
Reply Retweet Like
SentinelOne 8h
✨ Starting on the afternoon of June 15, a wide outage appeared to be affecting , social media platforms and mobile carriers. Is DDos is back? By
Reply Retweet Like
SentinelOne 8h
💡 Two CISO insights about obtaining certifications in the information security industry: with Jonathan Kimmitt, and Pedro A. Serrano - a guest post by
Reply Retweet Like
SentinelOne 9h
🔷 Meet (aka "EternalBlue"), the critical exploit leaked by the and deployed in the and attacks. How does Eternalblue work? How to stay safe from eternalblue? #
Reply Retweet Like
SentinelOne retweeted
liron_hazan 19h
Yet another post I wrote and got published under tech medium :) I recommend following -->
Reply Retweet Like
SentinelOne 10h
💻 When admins go to battle over which operating system is the most secure, it's time to turn to our guide on endpoint security. The real answer is here!
Reply Retweet Like
SentinelOne 11h
🎓 The Complete Guide To Understanding MITRE's 2020 ATT&CK Evaluation &CK
Reply Retweet Like
SentinelOne retweeted
ΔĐVΔŇƀРƤ€ŘŞƗŞŦ€ŇŦ Ŧ€ΩỮƗŁΔ Jul 13
I love this feature ! Been waiting soooo long for a vendor to do this. This is the innovation that makes you a leader in the industry.
Reply Retweet Like
SentinelOne Jul 13
Replying to @justbeingsol
Sure! Here are few docs on VT you can use DM if you need more!
Reply Retweet Like
SentinelOne Jul 13
⏳ The History of Cyber Security — Everything You Ever Wanted to Know
Reply Retweet Like
SentinelOne retweeted
SINET Jul 13
What do , , , Orca have in common? SINET Live! Join us on Tuesday, JULY 14, 9:00am-10:00am PT
Reply Retweet Like
SentinelOne Jul 13
🏃🏽 ransomware is cementing its position as a tool for low-to-mid level criminals looking for an effective, easy-to-use malware tool. See how SentinelOne blocks it.
Reply Retweet Like
SentinelOne Jul 13
👉 How Offensive Actors Use AppleScript For Attacking macOS | by
Reply Retweet Like
SentinelOne Jul 13
👔 Cyber Insurance & Information Security | Is InfoSec’s Criticism of Cyber Insurance Fair? A Guest Post by Jeffrey Smith
Reply Retweet Like
SentinelOne Jul 13
🕶️ Find Applications with Full Disk Access Permissions () sudo sqlite3 /Library/Application\ Support/com.apple.TCC/TCC.db "SELECT client,allowed FROM access WHERE service == 'kTCCServiceSystemPolicyAllFiles'" | grep '1'$
Reply Retweet Like
SentinelOne Jul 13
Reply Retweet Like
SentinelOne Jul 13
📶 How to find devices connected to your LAN (): while true; do clear; arp -alnx; c=$(arp -alnx | wc -l); let n=$c-1; printf '\tCount: \t'$n'\n'; sleep 2; done; Find more macOS Power Tricks for Security Pros here:
Reply Retweet Like