Cyber Security News
The Galileo Systems Group blog features cybersecurity articles and intelligence from our trusted vendors including SentinelOne, Webroot, Proofpoint, and more. As an MSP, we believe in a layered security approach, using best‑in‑class solutions from multiple vendors to provide stronger, more resilient protection for our clients.
*Galileo does not host, reproduce, or claim ownership of any articles linked to below. All content belongs to its original publisher.
sentinelone.com Sentinels League 2026: Live Rankings for the Threat Hunting World Championship
Sentinels League 2026 brings global threat hunters together to battle across AI, Endpoint, Cloud, and SIEM surfaces for $100K in…
proofpoint.com Device Code Phishing is an Evolution in Identity Takeover
sentinelone.com Turn Blind Trust into Verified Control with Prompt Security for Agentic AI
Prompt for Agentic AI Security empowers organizations with proactive governance, meaning security teams can deploy agents with confidence.
proofpoint.com 5 Ways to Maximize Email Protection with Proofpoint
sentinelone.com SHub Reaper | macOS Stealer Spoofs Apple, Google, and Microsoft in a Single Attack Chain
SHub Reaper bypasses Apple's Terminal mitigation, steals credentials and documents, and plants a persistent backdoor for continued access after infection.
proofpoint.com When trusted apps become trusted backdoors: what the Vercel incident shows about modern account takeover
sentinelone.com Breaking the Black Box: A Case Study in Red-Teaming a Government Education AI
In a new red-teaming exercise, social engineering moved to advanced tunneling attacks, revealing a critical lesson in today's AI security.
proofpoint.com From Search to Reconstruction: The Next Era of Investigations
sentinelone.com Living Off the Pipeline: Defending Against CI/CD Subversion
Learn how adversaries weaponize CI/CD pipelines and how continuous behavioral monitoring helps protect against software supply chain attacks.
sentinelone.com The Good, the Bad and the Ugly in Cybersecurity – Week 20
Police dismantle dark web markets, threat actors weaponize AI for zero-day exploits, and ShinyHunters extorts an edutech giant via XSS…
sentinelone.com The Convergence of Cloud Secrets & AI Risk
SentinelOne’s latest report examines the evolving 'secrets' threatscape, showing how modern cloud and AI infrastructures are being exploited.
sentinelone.com The Good, the Bad and the Ugly in Cybersecurity – Week 19
Karakurt and DPRK facilitators sentenced, PCPJack worm steals cloud credentials while evicting rivals, and attackers exploit an unpatched PAN-OS zero-day.