Cyber Security News

The Galileo Systems Group blog features cybersecurity articles and intelligence from our trusted vendors including SentinelOne, Webroot, Proofpoint, and more. As an MSP, we believe in a layered security approach, using best‑in‑class solutions from multiple vendors to provide stronger, more resilient protection for our clients.

*Galileo does not host, reproduce, or claim ownership of any articles linked to below. All content belongs to its original publisher.

48 articles Updated
proofpoint.com UNREAD

Governing Claude like you govern your people—with the Claude Compliance API

Cyber Security News sentinelone.com

Sentinels League 2026: Live Rankings for the Threat Hunting World Championship

Sentinels League 2026 brings global threat hunters together to battle across AI, Endpoint, Cloud, and SIEM surfaces for $100K in…

sentinelone.com
Cyber Security News proofpoint.com

Device Code Phishing is an Evolution in Identity Takeover

proofpoint.com
Cyber Security News sentinelone.com

Turn Blind Trust into Verified Control with Prompt Security for Agentic AI

Prompt for Agentic AI Security empowers organizations with proactive governance, meaning security teams can deploy agents with confidence.

sentinelone.com
Cyber Security News proofpoint.com

5 Ways to Maximize Email Protection with Proofpoint

proofpoint.com
Cyber Security News sentinelone.com

SHub Reaper | macOS Stealer Spoofs Apple, Google, and Microsoft in a Single Attack Chain

SHub Reaper bypasses Apple's Terminal mitigation, steals credentials and documents, and plants a persistent backdoor for continued access after infection.

sentinelone.com
Cyber Security News proofpoint.com

When trusted apps become trusted backdoors: what the Vercel incident shows about modern account takeover

proofpoint.com
Cyber Security News sentinelone.com

Breaking the Black Box: A Case Study in Red-Teaming a Government Education AI

In a new red-teaming exercise, social engineering moved to advanced tunneling attacks, revealing a critical lesson in today's AI security.

sentinelone.com
Cyber Security News proofpoint.com

From Search to Reconstruction: The Next Era of Investigations

proofpoint.com
Cyber Security News sentinelone.com

Living Off the Pipeline: Defending Against CI/CD Subversion

Learn how adversaries weaponize CI/CD pipelines and how continuous behavioral monitoring helps protect against software supply chain attacks.

sentinelone.com
Cyber Security News sentinelone.com

The Good, the Bad and the Ugly in Cybersecurity – Week 20

Police dismantle dark web markets, threat actors weaponize AI for zero-day exploits, and ShinyHunters extorts an edutech giant via XSS…

sentinelone.com
Cyber Security News sentinelone.com

The Convergence of Cloud Secrets & AI Risk

SentinelOne’s latest report examines the evolving 'secrets' threatscape, showing how modern cloud and AI infrastructures are being exploited.

sentinelone.com
Cyber Security News sentinelone.com

The Good, the Bad and the Ugly in Cybersecurity – Week 19

Karakurt and DPRK facilitators sentenced, PCPJack worm steals cloud credentials while evicting rivals, and attackers exploit an unpatched PAN-OS zero-day.

sentinelone.com

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X