Tag: SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs, and cybercrime across all platforms.

LABScon25 Replay | How to Bug Hotel Rooms v2.0

Dan Tentler reveals how consumer hardware coupled with Home Assistant can monitor hotel rooms, detect occupants through walls, and trigger automated alerts. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light…

LABScon25 Replay | Hacktivism and War: A Clarifying Discussion

Jim Walter unpacks the hacktivist landscape and reveals how to distinguish different levels of threat based on persona characteristics. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world…

LLMs & Ransomware | An Operational Accelerator, Not a Revolution

LLMs make competent ransomware crews faster and novices more dangerous. The risk is not superintelligent malware, but rather industrialized extortion. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the…

LABScon25 Replay | LLM-Enabled Malware In the Wild

Learn how to detect malware that generates code at runtime. SentinelLABS reveals hunting techniques and how to uncover novel AI-enabled threats. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on…

China’s Covert Capabilities | Silk Spun From Hafnium

China-linked hackers used patented spyware tech from front companies tied to Hafnium, exposing gaps in cyber threat attribution. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of…