Cyber Security News

The Galileo Systems Group blog features cybersecurity articles and intelligence from our trusted vendors including SentinelOne, Webroot, Proofpoint, and more. As an MSP, we believe in a layered security approach, using best‑in‑class solutions from multiple vendors to provide stronger, more resilient protection for our clients.

*Galileo does not host, reproduce, or claim ownership of any articles linked to below. All content belongs to its original publisher.

46 articles Updated
sentinelone.com UNREAD

Turn Blind Trust into Verified Control with Prompt Security for Agentic AI

Prompt for Agentic AI Security empowers organizations with proactive governance, meaning security teams can deploy agents with confidence.

Cyber Security News sentinelone.com

SHub Reaper | macOS Stealer Spoofs Apple, Google, and Microsoft in a Single Attack Chain

SHub Reaper bypasses Apple's Terminal mitigation, steals credentials and documents, and plants a persistent backdoor for continued access after infection.

sentinelone.com
Cyber Security News proofpoint.com

Device Code Phishing is an Evolution in Identity Takeover

proofpoint.com
Cyber Security News sentinelone.com

Breaking the Black Box: A Case Study in Red-Teaming a Government Education AI

In a new red-teaming exercise, social engineering moved to advanced tunneling attacks, revealing a critical lesson in today's AI security.

sentinelone.com
Cyber Security News proofpoint.com

5 Ways to Maximize Email Protection with Proofpoint

proofpoint.com
Cyber Security News sentinelone.com

Living Off the Pipeline: Defending Against CI/CD Subversion

Learn how adversaries weaponize CI/CD pipelines and how continuous behavioral monitoring helps protect against software supply chain attacks.

sentinelone.com
Cyber Security News proofpoint.com

When trusted apps become trusted backdoors: what the Vercel incident shows about modern account takeover

proofpoint.com
Cyber Security News sentinelone.com

The Good, the Bad and the Ugly in Cybersecurity – Week 20

Police dismantle dark web markets, threat actors weaponize AI for zero-day exploits, and ShinyHunters extorts an edutech giant via XSS…

sentinelone.com
Cyber Security News proofpoint.com

From Search to Reconstruction: The Next Era of Investigations

proofpoint.com
Cyber Security News sentinelone.com

The Convergence of Cloud Secrets & AI Risk

SentinelOne’s latest report examines the evolving 'secrets' threatscape, showing how modern cloud and AI infrastructures are being exploited.

sentinelone.com
Cyber Security News proofpoint.com

How a financial institution closed email security gaps by replacing Mimecast with Proofpoint

proofpoint.com
Cyber Security News sentinelone.com

The Good, the Bad and the Ugly in Cybersecurity – Week 19

Karakurt and DPRK facilitators sentenced, PCPJack worm steals cloud credentials while evicting rivals, and attackers exploit an unpatched PAN-OS zero-day.

sentinelone.com
Cyber Security News proofpoint.com

Our takeaway: Gartner® highlights the risk in machine email—why a dedicated SMTP relay architecture is required

proofpoint.com

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X