- SentinelOne published an annual threat report describing a shift in cyber breaches toward abuse of identity systems, enterprise infrastructure, and automation.
- The report said edge devices have become a primary attack surface, with nearly 46% of recent zero-days targeting them.
- It identified increased targeting of CI/CD pipelines and development workflows to introduce malicious code and extract secrets before deployment.
- The report said identity-based intrusions often use stolen tokens, phishing, and compromised accounts, and it recommended continuous monitoring of post-login behavior.
- Steve Stone said attackers are relying less on single exploits and more on gaps between security and operations, and emphasized testing whether controls can withstand modern attacks.
Disclaimer: This news brief was created by Public Technologies (PUBT) using generative artificial intelligence. While PUBT strives to provide accurate and timely information, this AI-generated content is for informational purposes only and should not be interpreted as financial, investment, or legal advice. SentinelOne Inc. published the original content used to generate this news brief via Business Wire (Ref. ID: 20260324960213) on March 24, 2026, and is solely responsible for the information contained therein.