SentinelOne
banner
sentinelone.com
SentinelOne
@sentinelone.com
The world’s most advanced, autonomous AI-powered cybersecurity platform. We empower the world to run securely, with leading organizations trusting us to Secure Tomorrow™. Secure your enterprise: http://sentinelone.com/request-demo/
Three regions. Three masters of the hunt. One global champion.

Explore the competition: s1.ai/S1-League
Threat Hunting World Championship 2025 | SentinelOne
Win from a $100K prize pool in SentinelOne’s 2025 Threat Hunting Championship. Compete in detection challenges. Register today!
s1.ai
October 28, 2025 at 10:00 PM
Asia Finalist Ethan Chew: Ethan's balance of skill, adaptability, and calm precision make him a threat across every surface, but he especially dominates in Endpoint.
October 28, 2025 at 10:00 PM
Americas Finalist Derek Render: This U.S. flag hunter is in a league of his own for his unmatched ability to thrive under pressure as he seeks out and captures the game's hardest flags.
October 28, 2025 at 10:00 PM
Europe Finalist Arnau Osso: A cloud maestro and relentless finisher, Arnau's precision and competitive drive led to perfect scores across Endpoint and Cloud.
October 28, 2025 at 10:00 PM
Meet the finalists heading to OneCon for the Sentinels League Threat Hunting World Championship — where speed, precision, and nerve will decide who claims the crown.
October 28, 2025 at 10:00 PM
Researchers also identified a related Android vector collecting location, contacts, and media — likely part of a broader surveillance effort.
October 22, 2025 at 3:40 PM
Despite six months of prep, the infrastructure was active for just one day — suggesting deliberate exposure control and disciplined OPSEC.
October 22, 2025 at 3:40 PM
The lure used a “Paste & Run” technique — a ClickFix-style prompt that convinces users to paste PowerShell commands manually, helping attackers evade file-based detection.
October 22, 2025 at 3:40 PM
Victims were lured to a spoofed Zoom domain — zoomconference[.]app — which displayed a convincing fake Cloudflare verification page.

Behind it: a multi-stage PowerShell chain ending in a WebSocket-based RAT hosted on Russian infrastructure.
October 22, 2025 at 3:40 PM
The campaign, which used a fake Cloudflare captcha page to deliver a WebSocket RAT, impersonated the Ukrainian President’s Office, sending weaponized PDFs to members of the:
– Red Cross
– UNICEF
– Norwegian Refugee Council
– Regional administrations across Donetsk, Poltava & Dnipropetrovsk
October 22, 2025 at 3:40 PM
Why it matters: It’s the latest sign of disciplined cyber-espionage tactics designed to quietly gather intelligence on humanitarian and reconstruction efforts inside Ukraine. Six months of setup. One day online. Precision, not volume.
October 22, 2025 at 3:40 PM
Front-row access. No slides, no fluff. RSVP to our YouTube or LinkedIn livestreams to hear from @stonepwn3000.bsky.social, @jags.bsky.social, and Drea London—and to learn what we found, how we analyzed it, and what defenders should know next.

📺 YouTube: bit.ly/4kWpbAb
📲 LinkedIn: bit.ly/3JUw8oi
SentinelOne
SentinelOne’s cybersecurity solution encompasses AI-powered prevention, detection, response and hunting across endpoints, containers, cloud workloads, and IoT devices in a single autonomous XDR platfo...
bit.ly
October 14, 2025 at 9:44 PM
The Bottom Line: Harnessed correctly, agents don’t just automate analysis — they amplify tradecraft.

🎥 Watch the full replay: s1.ai/LC25-WP
LABScon25 Replay | Auto-Poking The Bear: Analytical Tradecraft In The AI Age
AI agents promise speed, but at what cost to trust? Dreadnode’s Wendiggensen & Palm unpack this dilemma through a hands-on study of leaked Russian data.
s1.ai
October 9, 2025 at 9:35 PM