Not attending Black Hat? Don't worry, we will still be posting the show recording on LinkedIn, YouTube and Spotify:
🎧 Spotify - bit.ly/4mm657z
📱LinkedIn (pre register for notifications) - bit.ly/4mkd54Q
📺 YouTube - bit.ly/4kWpbAb
@sentinelone.com.bsky.social
The world’s most advanced, autonomous AI-powered cybersecurity platform. We empower the world to run securely, with leading organizations trusting us to Secure Tomorrow™. Secure your enterprise: http://sentinelone.com/request-demo/
Not attending Black Hat? Don't worry, we will still be posting the show recording on LinkedIn, YouTube and Spotify:
🎧 Spotify - bit.ly/4mm657z
📱LinkedIn (pre register for notifications) - bit.ly/4mkd54Q
📺 YouTube - bit.ly/4kWpbAb
We will also be announcing the master topic and on-the-clock countdown topics early next week, so keep an eye out!
Don't miss your chance to see Drea London, @stonepwn3000.bsky.social, @dakotaindc.bsky.social, and @jags.bsky.social spice it up. 👀 😤
🚨 Black Hat... meet 'Just A Sec' 🖤 💜
🔥We are bringing our livestream show to the expo floor of Black Hat at SentinelOne Booth #3033 on Wednesday, Aug. 6 at 11 a.m. PT.
🔗 Full report, authored by @sentinellabs.bsky.social's @dakotaindc.bsky.social: s1.ai/SilkPatents
30.07.2025 17:18 — 👍 1 🔁 0 💬 0 📌 0📚 Zoom out: Hafnium’s 2021 MES campaign triggered an unprecedented joint U.S.-EU-UK rebuke. This report shows that wasn’t a one-off—it was a glimpse into a broader, layered offensive apparatus.
30.07.2025 17:18 — 👍 0 🔁 0 💬 1 📌 0These offensive patents include:
🔍 Tools to bypass Apple FileVault
📱 Mobile and router forensics software
🏠 Surveillance tools for smart home devices
💡 What’s new:
– Direct links between indicted hackers, contracting companies, and China’s state security
– Evidence that Hafnium’s tooling goes far beyond what’s publicly documented
– Fresh questions about how China’s Ministry of State Security (MSS) supports its contractors
🧵 Why it matters: This is a deep dive into the ecosystem behind one of China’s most notorious threat actors.
30.07.2025 17:18 — 👍 0 🔁 0 💬 1 📌 0The Cyber Patents China Didn’t Want Us to Find…
@sentinellabs.bsky.social has uncovered 10+ patents for highly intrusive forensics and data collection tools—filed by companies named in U.S. government indictments for working with the Chinese Hafnium (aka Silk Typhoon) APT group.
📖 Full breakdown from SentinelOne: s1.ai/GBU7-Wk29
25.07.2025 17:33 — 👍 0 🔁 0 💬 0 📌 0🧠 What to do now:
- Patch SharePoint servers immediately
- Share the Phobos decryptor with impacted users
- Monitor dark-web channels for Lumma activity
🤢 UGLY
• ToolShell exploit chain escalates including instances attributed to two China-based hacking groups
• Microsoft patches SharePoint zero-days
• CISA issues emergency directive
✅ GOOD
• Free decryptor for Phobos/8Base ransomware
• Admin of XSS[.]is, the notorious Russian-speaking cybercrime platform, arrested in Kyiv
🚨 This Week in Cyber: The Good, the Bad, and the Ugly 🚨
25.07.2025 17:33 — 👍 0 🔁 0 💬 1 📌 0🛡️ SentinelOne continues to monitor and assist customers.
21.07.2025 23:16 — 👍 1 🔁 0 💬 0 📌 0📌 Go deeper ➡️ s1.ai/toolshell
- Timeline of in-the-wild exploitation
- Technical deep dive on all three TTP clusters
- Mitigation steps and IOCs
- Detection & hunting queries from SentinelOne
🛠️ Why it matters: “ToolShell” is trivial to exploit, stealthy, and lets attackers gain persistent access to valuable environments. SharePoint’s role as a data store and delivery mechanism makes it a high-value target.
21.07.2025 23:16 — 👍 0 🔁 0 💬 1 📌 0PoC code is now public. Broader exploitation is expected.
21.07.2025 23:16 — 👍 0 🔁 0 💬 1 📌 0🧵 What’s happening:
– The three unique attacker clusters are targeting tech, critical infrastructure and architecture and engineering firms
– Two clusters deployed webshells designed to execute commands or collect sensitive system information. Another operated filelessly.
We first observed SharePoint exploitation on July 17, two days before Microsoft’s official advisory.
21.07.2025 23:16 — 👍 0 🔁 0 💬 1 📌 0🚨 SentinelOne Uncovers 3 Distinct Attack Clusters Targeting Microsoft SharePoint: As part of the “ToolShell” Zero-Day being exploited in-the-wild, our threat researchers have identified three distinct attack clusters, each with unique tradecraft and objectives.
21.07.2025 23:16 — 👍 5 🔁 2 💬 2 📌 1With cyber threats surging in the AI era, your ideas can reshape the battlefield. Submit your insights by August 15 at s1.ai/OneConCFC
21.07.2025 17:05 — 👍 0 🔁 0 💬 0 📌 0💡Ignite the AI Era discussion with your ideas at OneCon, where our industry redefines and reimagines cybersecurity with fearless innovation. Share the stage with the industry’s top minds, together pushing the boundaries that spark groundbreaking ideas 🔥
21.07.2025 17:05 — 👍 0 🔁 0 💬 1 📌 0Don't the miss the opportunity to speak at OneCon 2025. Submit your paper for consideration 🗣️ s1.ai/OneConCFC
21.07.2025 17:05 — 👍 0 🔁 0 💬 1 📌 0👉 Read the full analysis from our threat researchers: s1.ai/katz
21.07.2025 16:56 — 👍 0 🔁 0 💬 0 📌 0The bottom line: Katz is a modern infostealer built for more widespread adoption. Its success highlights the dangerous trend of professional-grade malware made accessible to the masses.
21.07.2025 16:56 — 👍 0 🔁 0 💬 1 📌 0🧠 Driving the rise:
• Easy-to-use builder for custom payloads
• Built-in campaign and log management
• Support for crypto wallets, browsers, messaging apps
• Stealthy delivery: Steganography, process hollowing, in-memory loaders
Why it matters: Katz Stealer is a turnkey Malware-as-a-Service with a slick web panel, lower cost, and a feature set built for scale. It’s marketed across Telegram, Discord, and cybercrime forums—and being used by threat actors of all skill levels.
21.07.2025 16:56 — 👍 0 🔁 0 💬 1 📌 0💰 Credential Theft-as-a-Service? A new, turnkey infostealer is gaining traction fast—and it’s not just for sophisticated actors, with this malware’s "accessible" pricing and low barrier to entry.
21.07.2025 16:56 — 👍 1 🔁 0 💬 1 📌 0📖 Full research by @philofishal.bsky.social and @syrion89.bsky.social: s1.ai/nimdoor
02.07.2025 14:18 — 👍 2 🔁 0 💬 0 📌 0