Skip to main content

PinnacleOne ExecBrief | The New Global Disorder

In our previous brief, PinnacleOne brought executive attention to the likely future developments of AI’s application to offensive cyber operations.

This week, we focus decision-makers on the ten strategic challenges that will define a new global disorder.

Please subscribe to read future issues — and forward this newsletter to interested colleagues.

Contact us directly with any comments or questions: This email address is being protected from spambots. You need JavaScript enabled to view it.

Insight Focus | The New Global Disorder

Classifying AI like nuclear physics secrets. Banning sales of foreign chip products that only tangentially touch U.S. tech. Adding more Chinese chipmaking firms to the Restricted List. Cajoling allies to cut-off more chipmaking tool sales. These are just a few of the recent signs that the Tech War is heating up as the economic and national security stakes drive U.S. policymakers to escalate in the face of increasing strategic challenges.

Continue reading
3 Hits
0 Comments

Supercharge Your IT Without Breaking the Bank: Discover Managed IT Services

Streamline and Save with Managed IT ServicesAs your business evolves, so do your IT needs—digitization, network management, security, and mobile support. Meeting these demands can be challenging and costly, but it doesn't have to be. Managed IT services provide exceptional care, often at a comparable or even lower cost than maintaining an in-house ...

Continue reading
2 Hits
0 Comments

The Good, the Bad and the Ugly in Cybersecurity – Week 29

The Good | Interpol-Led Operation Cracks Down on West African Cybercrime Syndicates

The axe has fallen hard on West African crime syndicates as part of Operation Jackal III, a months-long law enforcement effort run across 21 countries. This week, Interpol reported some 300 arrests, the identification of over 400 suspects, 720 blocked bank accounts, and the seizure of $3 million in illicit funds, all to dismantle multiple criminal networks globally.

Amongst the affected crime syndicates, Black Axe has been a prominent plague within Africa and across the world. Their operations span human trafficking, drug smuggling, violent crimes, and significant cases of cyber fraud where victims were forced to sell their homes as a result of the scams. Believed to have been in operation for decades, Black Axe is closely linked to business email compromise (BEC) schemes, ‘romance’ fraud, and other identity scams.

Source: Interpol

In Argentina, authorities cracked down on a Nigerian-based transnational criminal infrastructure using millions in ‘supernotes’, counterfeit banknotes of very high quality, to open bank accounts in various countries in South America. Portuguese authorities similarly dismantled another Nigerian group that was laundering funds from online scam victims all across Europe. The data found on the seized devices revealed a mass network of cryptocurrency transactions indicative of a sophisticated money laundering operation.

The financial fraud industry is a dangerous and extensive one in West Africa, highlighting the success of the operation in reducing the ability for organized crime leaders to develop and extend their reach. Cross-border collaboration continues to be instrumental in combating deep-rooted criminal networks. Interpol currently has 196 member countries and works with national police forces to exchange intelligence and provide real-time access to databases leading to more efficient arrests.

The Bad | Flaws in SAP AI Core Expose Sensitive Customer Data & Allow Service Takeovers

Cybersecurity researchers this week reported on five critical security flaws in SAP AI Core, a cloud-based platform for creating and deploying AI workflows, which could be exploited to access tokens and customer data. The flaws, dubbed “SAPwned”, could allow attackers to infiltrate customers’ data and contaminate internal artifacts, potentially spreading to other services and environments.

Continue reading
4 Hits
0 Comments

New Apple Immersive Video series and films premiere on Vision Pro

Starting this week, Apple is releasing all-new series and films captured in Apple Immersive Video that will debut exclusively on Apple Vision Pro.

Original author: Apple Newsroom

1 Hits
0 Comments

Can the data center industry’s rapid evolution undermine sustainability?

Design and construction decisions should be forward-thinking, considering environmental impacts across the entirety of the facility's lifespan — from initial installation, through maintenance, to expansion.



2 Hits
0 Comments

Apple scores record 72 Emmy Award nominations and sweeps across top categories

Apple TV+ today landed a record 72 Emmy Award nominations across 16 broadly celebrated Apple Originals.

Original author: Apple Newsroom

1 Hits
0 Comments

New guide aims to make metal buildings more energy efficient

With its focus on metal building systems, this MBMA guide fills a specific need in the market and positions the metal building industry as a leader in the energy efficiency space.

2 Hits
0 Comments

Apple helps launch Bay Area Housing Innovation Fund

Apple teams up with experts in affordable housing development to launch the new Bay Area Housing Innovation Fund.

Original author: Apple Newsroom

0 Hits
0 Comments

The power problem will impact economic growth

This symbiotic relationship also has implications for data centers. Several decades into the 21st century, the rise of digital transactions and the pivotal role of data centers highlight a critical challenge: the need for robust and sustainable energy infrastructure.

0 Hits
0 Comments

What Is the Most Secure Way to Share Passwords with Employees?

Elevate Technology: Enhance Security with Advanced Password ManagementBreached or stolen passwords are a significant cybersecurity issue, contributing to over 80% of data breaches. Hackers exploit weak, stolen, or reused passwords to gain unauthorized access, making secure password management crucial. In an era where passwords are integral to our d...

Continue reading
2 Hits
0 Comments

How physical security technology can support the sustainability agenda

Within data centers, physical security technology emerges as an unexpected but strong ally in the pursuit of sustainability objectives.

1 Hits
0 Comments

PinnacleOne ExecBrief | AI’s Potential for Hacking

In our previous brief, PinnacleOne highlighted the flashpoint risk in the South China Sea between the Philippines, its treaty allies – the U.S. and China.

This week, we focus executive attention on the likely future developments of AI’s application to offensive cyber operations.

Please subscribe to read future issues — and forward this newsletter to interested colleagues.

Contact us directly with any comments or questions: This email address is being protected from spambots. You need JavaScript enabled to view it.

Insight Focus | AI for Offensive Cyber Operations Isn’t Here…Yet

The hand of AI used in offensive cyber operations won’t have obvious fingerprints. Defenders are unlikely to find a fully autonomous agent on their network hacking away. Not only would attackers be risking a (currently) incredibly valuable system to discovery, but such a maneuver lacks something very important to the people executing attacks: control. Governments use many different legal frameworks, organizational structures, and oversight mechanisms to ensure that hacking operations are run intentionally, with acceptable risks, and (sometimes) deniability. Deploying a fully autonomous agent into a hostile environment creates so many unacceptable risks that it may only ever happen if innovations in defense compel it. Currently, it’s sufficiently easy to achieve most offensive objectives without AI.

Continue reading
1 Hits
0 Comments

Managed Detection and Response (MDR) Beyond the Endpoint

Endpoint Detection and Response (EDR) has been the foundational technology of effective detection and response programs for many years, providing security teams with unparalleled visibility and response capabilities across end user systems, cloud workloads, and servers. While this remains true today, security operation centers (SOC) and incident response (IR) teams need additional capabilities ‘beyond the endpoint’ to protect modern enterprise environments.

In this blog post, learn how SentinelOne is extending the scope of our MDR service to provide 24×7 detection and response coverage across endpoint, cloud, identity, email, network, and beyond.

The Evolution of Endpoint Detection

In the early days of security monitoring and incident response, security teams relied primarily on network telemetry to identify and investigate cyber attacks. Direct visibility into activity on endpoints and servers was extremely limited, requiring SOC analysts and incident responders to infer what was happening within their environment based on network traffic to and from these systems.

This network-focused approach was reasonably effective – primarily because most network traffic was unencrypted, adding to the amount of alert ‘noise’ and making real threats hard to miss. However, as threats continued to evolve and encrypted network traffic became the norm, defenders struggled to maintain visibility into the infrastructure they were responsible for protecting.

Effective endpoint protection and endpoint detection and response (EPP/EDR) changed everything. Defenders gained full visibility into endpoint activity, such as detection of malware and other malicious activity, process execution, file system access, and network telemetry. Once a threat was identified, defenders could pivot quickly to incident response, collecting additional forensic artifacts, terminating malicious processes, and isolating compromised systems from the network thus limiting further incident scope and impact.

Continue reading
1 Hits
0 Comments

Apple introduces HomePod mini in midnight

Apple today introduced HomePod mini in midnight, made with 100 percent recycled mesh fabric.

Original author: Apple Newsroom

0 Hits
0 Comments

Sustainable data center cooling

In many data centers, water-cooled chillers are paired with an open- or closed-circuit cooling tower for heat rejection. 

0 Hits
0 Comments

The Good, the Bad and the Ugly in Cybersecurity – Week 28

The Good | Feds Dismantle Major GenAI-Based Bot Farm Spreading Pro-Russian DisInformation Campaigns

In a joint international operation led by the FBI, law enforcement have seized two domain names and nearly a thousand social media accounts all controlled by a large bot farm dedicated to spreading Russian propaganda. Under the management of a Russian FSB officer and a deputy editor-in-chief at news organization Russia Today (RT), the bots have spread disinformation campaigns globally through a generative AI-based software called Meliorator since 2022. Based on the FBI’s findings, RT leadership have been focused on expanding their information dissemination beyond traditional television.

Meliorator allowed the bot farm operators to create highly convincing X (formerly Twitter) profiles and personas designed to amplify Russian foreign interest as well as false narratives in order to sway public opinion and fuel discord online. As of June 2024, the functionality of the generative AI software was limited to X, but the FBI are predicting its expansion into other social networks with time. Use of Meliorator has been seen across Germany, Israel, the Netherlands, Poland, Spain, Ukraine, and the United States.

Source: Department of Justice

As part of the joint operation, the two domains mlrtr[.]com and otanmail[.]com used to register the bots were seized alongside 968 X accounts directly linked to RT’s bot farm. This is a first major action in disrupting Russian state-sponsored social media bot farms. A joint advisory between all involved global law enforcement agencies provides a technical breakdown of the Meliorator software, recommended mitigation measures, and a list of resources on combating malign influence and disinformation campaigns. X has since suspended the remaining bot accounts listed in court documents for violating the platform’s terms of service.

The Bad | Scammers Leverage Over 700 Domains to Sell Fake Tickets to Olympic Events

As anticipation for the Olympics mounts, threat actors are ramping up their large-scale fraud campaigns designed to target hopeful buyers seeking tickets to the Paris Summer games. Security researchers tracking the activity have dubbed the campaign ‘Ticket Heist’ where threat actors offer fake tickets to Olympic events and other major sports games, concerts, and music festivals.

Researchers found that the threat actor began registering domains in 2022, averaging 20 new registrations each month since. With online hype surrounding the Olympic games and discussion about the International Olympic Committee’s ban on Russian and Belarusian athletes rising, analysts tuned in to monitor increasingly suspicious activities. They uncovered 708 domains hosting convincing websites all selling fake tickets and accommodation options for the summer games.

Continue reading
1 Hits
0 Comments

Why People Join & Love SentinelOne’s Sales Organization

I have been working in technology sales for over 25 years, starting out as a sales rep carrying a bag and a quota. The industry landscape looks radically different today than it did early in my career, but one thing will forever remain unchanged. The organization you choose to work for is paramount to your happiness and long-term success.

SentinelOne is a global leader in AI-powered security. Our Singularity Platform detects, prevents, and responds to cyberattacks at machine speed, empowering organizations to secure endpoints, cloud workloads, containers, identities, and mobile and network-connected devices with speed, accuracy, and simplicity. Leading enterprises, including Fortune 10, Fortune 500, Global 2000 companies, and prominent governments trust us to Secure Tomorrow.

There’s never been a better time to join SentinelOne. We are looking for talented, experienced sales people to join our team who are hungry for a life-changing career opportunity. I am incredibly fired up about where we are going, and I’d like to share more about what makes SentinelOne so special. For me, it’s the PEOPLE, PLATFORM, PERFORMANCE, AND POTENTIAL at our company that makes this a great place to work.

The PEOPLE Are Behind the Magic at SentinelOne

It starts at the top. Our CEO, Tomer Weingarten, is a true visionary. We enjoy the full support of his strategic engagement as a customer-first leader. Since founding SentinelOne 11 years ago, Tomer has not slowed his relentless pursuit of what’s next in a competitive landscape that changes by the second.

I joined SentinelOne eight months ago and reinforced our strong sales leadership team by hiring proven leaders with growth at scale to guide our teams to their full potential. These industry-leading experts have the experience we need during this next stage of hypergrowth as we continue to enhance our GTM prowess – this includes expanding our partner ecosystem, rapidly evolving our speed to market and ongoing investment in sales specialists and support functions. Their fresh perspectives blended with the excellence, effort, and experience of our tenured Sentinels are the perfect recipe for sustained growth.

Continue reading
0 Hits
0 Comments

The Impact of AI in Accelerating Autonomous Security Operations

Autonomous vehicles have captured the imagination of humans for decades. There are few examples of fully autonomous vehicles available today, designed for limited commercial use, but there is international consensus on what fully autonomous vehicles are and the standards by which they are measured. Autonomous flight is also quickly becoming one of the most popular, and controversial topics in aviation, known as “continuous autopilot engagement”, where machine learning-based algorithms are handling all necessary flight tasks from engine start through full navigation, landing, and shutdown.

In every case, security and safety are paramount due to the potential of harm to life and limb; therefore, we see that automation in transportation usually starts with features that increase security and enhance safety. The goal, however, is to make travel inexpensive and accessible to everyone while increasing efficiency and lowering cost. Whether referring to it as autonomy or automation, the truth is that artificial intelligence (AI) is progressively making these seemingly science fiction-based notions a reality.

There are many parallels that can be drawn between autonomous driving cars and what can be referred to as the Autonomous Security Operations Center (ASOC). Although it is still quite far off, this blog takes a deep dive into the key characteristics that would make the ASOC a reality and what this could mean in accelerating autonomous security operations based on well-defined levels of autonomous driving (Level 0-5).

From Autonomous Vehicles to Autonomous SOC

In traditional travel, it is typical to see one driver for one vehicle and one pilot for one aircraft. The same goes for cybersecurity – there is typically one analyst for one investigation or incident. Nowadays, one driver can monitor many highly automated vehicles with no steering wheels and no brake pedals. A single pilot can control and monitor many aircrafts. Soon, the information security community will see one security analyst handling many concurrent investigations or incidents through the use of AI-powered tools and agents.

Here are the key characteristics apparent within each level of the SAE international standards of driving automation:

Continue reading
1 Hits
0 Comments

Apple and Major League Baseball announce August “Friday Night Baseball” schedule

Apple and MLB today announced the August schedule for “Friday Night Baseball,” a weekly doubleheader available to Apple TV+ subscribers.

Original author: Apple Newsroom

0 Hits
0 Comments

Three new games come to Apple Arcade in August, including Temple Run: Legends

Three new games join Apple Arcade in August, including Temple Run: Legends and Vampire Survivors+.

Original author: Apple Newsroom

0 Hits
0 Comments