What the SentinelOne Breach Reveals About Modern Cybersecurity
In April 2025, SentinelOne, a leading endpoint detection and response (EDR) vendor, revealed it had been targeted by sophisticated cyber-espionage campaigns, including China-linked PurpleHaze attacks and infiltration attempts by North Korean operatives. This incident underscores a critical truth: even the most advanced endpoint security solutions are not impervious to determined adversaries.
While SentinelOne’s proactive detection mitigated the threat, the attack highlights the limitations of relying solely on endpoint protection and traditional defense-in-depth strategies.
At SecuLore, we believe that robust cybersecurity demands a paradigm shift—prioritizing continuous network monitoring, deep packet inspection (DPI), and a staffed 24/7 Security Operations Center (SOC) to stay ahead of evolving threats.
SentinelOne Incident: A Wake-Up Call
SentinelOne’s disclosure revealed that the PurpleHaze threat cluster, linked to the Chinese state-sponsored APT15 (Nylon Typhoon), conducted reconnaissance on its systems and high-value clients. Additionally, over 1,000 fake job applications from North Korean operatives using 360 false identities attempted to infiltrate the company. The attackers leveraged advanced tactics, including the GoReShell backdoor and ScatterBrain-obfuscated ShadowPad malware, exploiting n-day vulnerabilities in CheckPoint gateway devices to compromise over 70 organizations globally between July 2024 and March 2025.
While SentinelOne’s internal telemetry and rapid response contained the threat, the incident exposes a broader issue: no single layer of defense, no matter how sophisticated, is foolproof. Endpoint detection, while critical, focuses on securing individual devices. Determined adversaries, however, exploit gaps in visibility—whether through supply chain weaknesses, insider threats, or network-level intrusions—that endpoint solutions alone cannot address.
Limits of Defense in Depth
Defense in depth, the long-standing cybersecurity strategy of layering multiple controls (e.g., firewalls, antivirus, EDR, and intrusion detection systems), aims to create redundancy to thwart attacks. However, the SentinelOne incident illustrates why this approach, while necessary, is insufficient in today’s threat landscape:
- Sophisticated Adversaries Bypass Layers: State-sponsored actors like PurpleHaze use advanced persistent threats (APTs) that exploit zero-day and n-day vulnerabilities, often targeting supply chain partners or unmonitored network segments. These attacks can evade even the most robust endpoint protections by moving laterally across networks.
- Blind Spots in Endpoint-Centric Security: EDR solutions excel at detecting and responding to threats on devices but lack visibility into network traffic. For example, the ShadowPad malware used in the SentinelOne attacks relied on network-based command-and-control (C2) communications, which could go undetected without comprehensive network monitoring.
- Delayed Detection and Response: Defense-in-depth layers often operate in silos, leading to fragmented visibility. Without real-time correlation of endpoint and network data, organizations may miss critical indicators of compromise, allowing attackers to dwell undetected for weeks or months.
- Supply Chain Vulnerabilities: The SentinelOne attack began with a compromise of a former hardware logistics provider, highlighting how third-party vulnerabilities can bypass internal defenses. Defense in depth rarely accounts for external partner risks, which require proactive monitoring beyond organizational boundaries.
These limitations reveal that defense in depth, while foundational, cannot keep pace with adversaries who exploit the interconnected nature of modern IT environments. To close these gaps, organizations must complement endpoint security with advanced network monitoring and human expertise.
Power of Network Monitoring with DPI
Network monitoring, particularly with deep packet inspection, provides the visibility and context needed to detect and respond to threats that evade endpoint defenses. Unlike EDR, which focuses on device-level activities, DPI analyzes the content and metadata of network traffic in real time, offering several advantages:
- Comprehensive Threat Detection: DPI can identify malicious patterns, such as C2 communications or data exfiltration, that endpoint solutions might miss. For instance, the GoReShell backdoor used in the SentinelOne attacks relied on reverse SSH connections, which could be detected through anomalous network traffic patterns.
- Lateral Movement Detection: Attackers often move laterally across networks after gaining initial access. DPI provides visibility into east-west traffic, enabling early detection of suspicious activity, such as unauthorized access attempts or malware propagation.
- Zero-Day and N-Day Exploit Identification: By analyzing packet payloads, DPI can detect exploits targeting unpatched vulnerabilities, like the CheckPoint gateway flaws exploited in the SentinelOne incident, before they reach endpoints.
- Supply Chain Threat Monitoring: DPI can monitor traffic to and from third-party vendors, identifying anomalies that may indicate a compromised partner, as seen in the SentinelOne supply chain attack.
At SecuLore, our network monitoring solutions leverage DPI to provide granular insights into network activity, ensuring organizations can detect and respond to threats in real time. This approach bridges the gaps left by defense-in-depth strategies, offering a proactive defense against sophisticated attacks.
Critical Role of a 24/7 SOC
Technology alone is not enough. The SentinelOne incident demonstrates that even cutting-edge tools require human expertise to interpret and act on alerts effectively. A staffed 24/7 SOC is the linchpin of a modern cybersecurity strategy, offering:
- Real-Time Threat Hunting: SOC analysts proactively hunt for threats, correlating network and endpoint data to identify subtle indicators of compromise. In the SentinelOne case, rapid investigation of the logistics provider intrusion was key to containing the threat.
- Incident Response and Mitigation: A 24/7 SOC ensures immediate response to incidents, minimizing dwell time. Analysts can isolate compromised devices, block malicious traffic, and coordinate with external partners to address supply chain risks.
- Continuous Improvement: SOC teams analyze attack trends and update detection rules, ensuring defenses evolve with the threat landscape. For example, insights from the PurpleHaze campaign can inform new DPI signatures to detect similar threats.
- Human Judgment for Complex Threats: Automated systems may struggle with nuanced attacks, such as the North Korean infiltration attempts using fake identities. SOC analysts bring contextual understanding to distinguish legitimate from malicious behavior.
SecuLore’s 24/7 SOC is staffed by experienced analysts who combine DPI-driven network insights with endpoint data to deliver unparalleled threat detection and response. Our team operates as an extension of your organization, providing the expertise needed to stay ahead of sophisticated adversaries.
New Cybersecurity Paradigm
The SentinelOne incident is a stark reminder that even the best endpoint detection vendors are not immune to attack. Defense in depth, while essential, cannot address the full spectrum of modern threats, from supply chain compromises to network-based attacks. To stay resilient, organizations must embrace a proactive approach that combines advanced network monitoring with deep packet inspection and a staffed 24/7 SOC.
At SecuLore, we empower organizations to move beyond reactive security. Our solutions deliver real-time visibility, actionable intelligence, and expert response, ensuring you can detect and defeat even the most sophisticated adversaries. Don’t let the next attack catch you off guard—contact SecuLore today to strengthen your cybersecurity posture.
Why Even the Best EDRs Get Hacked
Zero Day: TV Myths vs. Reality – Unpacking Cyber Threats to Public Safety and Government
Threat Detection and Response: A Case Study in Human Expertise
Why SOAR Isn’t the Right Cybersecurity Fit for Public Safety
World Backup Day: Essential Backup Strategies for Public Safety & Government
Managed Detection and Response FAQ: Everything Public Safety Agencies Need to Know
What is Deep Packet Inspection (DPI)?
Phishing Webinar: Inside the Hacker’s Toolbox
Insider Threat Case Study: Shawnee County
National Change Your Password Day: Do More Than Just Change Your Password
Protect What Matters Most: Make Data Privacy Day Count
Cyber Alert: Mitel and Oracle Vulnerabilities
Cyber Alert: Ivanti Connect Secure Flaw
Cybersecurity Monitoring Best Practices: A Kansas 911 Case Study
The Evolving Lifecycle of APTs: Current Tactics and Future Trends
Cyber Alert: Zyxel Firewall Vulnerability
Cyber Alert: Array Networks Critical Vulnerability
Don’t Let Cyber Threats Disrupt Your Networks During the Holidays
Cyber Insights and Lessons Learned from 2024 Cyber Attacks
Cyber Alert: Palo Alto Expedition Migration Vulnerability
CJIS Security Policy Updates: Changes for Public Safety & Law Enforcement
Unlocking Cybersecurity: How Encryption Protects Data and Fuels Cyber Threats
Cyber Alert: Critical Fortinet RCE Vulnerability
Cybersecurity Awareness Month 2024: Steps to Secure Your Network
What Is a Cybersecurity Gap Analysis? A Guide to Strengthening Your Defenses
Insider Threat Awareness: Protecting Your Network From Within
What are Advanced Persistent Threats (APTs)?
CJIS Assist, A New Compliance-Focused Monitoring & Scanning Service
Cyber Alert: Critical Jenkins Vulnerability
Practical Cybersecurity Principles for PSAPs | eBook
Cyber Alert: Windows TCP/IP Remote Code Execution Vulnerability – What Actions to Take
Presidential Election Year Impact on Cybersecurity: What it Means for Public Safety
Understanding the New CJIS Cybersecurity Requirements: A Guide
SecuLore Unveils CyberDSP: The Future of Scalable Cybersecurity for Public Safety & Critical Infrastructure
Protecting Cloud Environments Must Be a Top Priority
Cyber Alert: Update on CrowdStrike Issue With Windows Endpoint Agent
The Devious Dance: Social Engineering Tactics Targeting Critical Infrastructure
Why Defense-In-Depth Isn’t Enough
CJIS New Cybersecurity Requirements: What You Need to Know
Active Monitoring vs. Passive Monitoring – Which is Better?
Cyber Criminals Don’t Take Holidays
Navigating a Potential Cybersecurity Crisis: A Case Study in Swift Response
Cyber Attacks Against Federal Agencies Surge
Sean Scott Appointed to FCC’s CSRIC IX Working Group
Rise of AI in Cyber Warfare: Threats and Threat Detection
A Recap of CISA’s Cyber Resilient 911 Symposiums
EPA Warns of Increased Cyber Attack Risk
Ransomware Attacks Always Cost More Than The Ransom
Why Do Simple Cyber Attack Methods Work?
Ransomware Strains Are Becoming Dangerously Diverse
Phishing Tournaments: Don’t Get Caught in the Net
DHS Shows Concern About Emergency Services Cyber Attacks
Advanced Persistent Threats: Fear the Disruption
Addressing Attack Surface Management
SecuLore to Deliver Proven Security Operations Center (SOC) Monitoring and Cyber Protection to L3Harris Mission Critical Customers
KeyTrap DNSSEC Vulnerability: What You Need to Know
ScreenConnect RCE Flaw Exploited in Ransomware Attacks
Defense in Depth Cybersecurity: Is It Enough?
How to Build an Incident Response Playbook | eBook
CISA Issues Emergency Directive Regarding Ivanti VPN Vulnerability
Don’t Just Change Your Password on National Change Your Password Day
Why Data Privacy Day Should Matter to You
Atlassian Confluence Data Center and Server RCE Vulnerability
CISA Issues Warning: Microsoft SharePoint Vulnerability Actively Exploited
Operational Technology: Hidden Dangers in Legacy Systems
What is Cloud Security Monitoring? A Demystifying Guide
Lessons Learned From 2023’s Cyber Worst
Holiday Cybersecurity Threats
Is the Future Passwordless? How Passkeys Are Rising in Popularity
Apache ActiveMQ Vulnerability Receives 10/10 CVSS; Allows Undetected RCE
Addressing Cybersecurity and IT Burnout
What’s In Your Incident Response Playbook?
‘Citrix Bleed’ Vulnerability Massively Exploited in the Wild
Privilege Escalation Vulnerability for Cisco IOS XE Software Web UI
Embracing Zero Trust: How Hard Can It Be?
Cybersecurity Awareness Month 2023: Key Takeaways
What Can I Do About Zero Day Exploits?
Pen Testing: Are You Sure You Want To Do That?
Zetron Awarded Cybersecurity Services Contract for Kansas Counties
Ransomware is on the Rise Again: Defense Against New Players
How USB Malware Attacks Are Surging
Balloons, Apps, AI & Data Privacy
API Cybersecurity: Risks, Implications and Protection
Exacom Acquires SecuLore Solutions to Further Enhance the Cybersecurity of Public Safety Agencies
Critical MOVEit Transfer SQL Injection Vulnerabilities Discovered
Cloud Security Should Not Be Cloudy
What You Should Look for in Cloud Security
AI and the Cyber Threat Frontier
Don’t Get Hooked: Avoiding the Phish
What is Cyber Insurance and is it Worth it?
LockBit 3.0 is More Evasive Than Previous Versions, May Attack Wide Range of Critical Infrastructure Organizations
Cyber Incident Response Planning and Training
Cyber Risk Reduction and Cyber Insurance: Calculating Your Risk
What is Incident Response in Cybersecurity?
Fortinet Vulnerability (CVE-2022-42475) Rated 9.3/10 on CVSS Scale; Chinese Hackers Already Exploited
Lessons Learned from 2021 Cyber Attacks
Cyber Incident Response: What to Include in Your Playbook
SPNEGO Vulnerability Re-Classified As “Critical” After Finding It Allows Remote Code Execution
CISA, FBI, and HHS Advise Organizations to Implement Recommendations to Guard Against Hive Ransomware
CISA Issues Warning: Cyber Threat Actors Continue to Exploit Log4j Vulnerabilities
MicroAutomation Announces Partnership With SecuLore Solutions
Ransomware’s Hidden Costs: What You Need To Know
What are Cybersecurity Solutions?
Cybersecurity and the PSAP Request for Proposal Process
Cybersecurity Funding Roundtable Discussion with Maryland State Senator Cheryl Kagan
Roundtable Discussion on CSRIC’s Changing Focus to Cybersecurity
Prioritize Network Monitoring, Vigilance with CISA’s Cloud Security Technical Reference Architecture
Potential Ransomware Host in Ohio “Capable” of Cyber Attack Using MedusaLocker
What to Know About the Cyber Incident Reporting for Critical Infrastructure Act of 2022
What is Pen Testing and Do We Need It?
Moetivations Partner, SecuLore Solutions, Launches Next Level of Cloud Cybersecurity Monitoring
CISA Urges ALL Organizations, Large and Small, To Take Swift Actions on VMware Vulnerabilities
Zero-Trust Cybersecurity: The Time to Adopt is Now!
Creating Cyber Resiliency: Policies, Procedures and Planning
Cloudy Day: Cybersecurity Cloud Storms are Brewing
Russian Cyber Threats to U.S. Critical Infrastructure
Lessons Learned from 2022 Cyber Attacks
Log4j Vulnerability: Crisis and Mitigation
Public Safety & Services Already Feeling Wide Impact of Kronos Ransomware Attack
In Wake of the Log4j Vulnerability, Increase Focus on Cybersecurity Posture
Nation-State Actors: Not Your Average Hackers
NOC vs SOC: What is the Difference?
Don’t Take the Bait: Phighting the Phish
What Lurks in the Shadows of Your Network?
Working Remotely: RDP and VPN Policies, Protocols and Protection
How to Prevent and Respond to Ransomware Attacks
Cybersecurity Effectiveness: Test Your Backups!
Knowing Your Cyber Posture and Why It’s Important
Cloud Computing and Cybersecurity
CISA MS-ISAC Publish Updated Ransomware Guide
Behavior-Based Cybersecurity and Why You Need It
Practical Principals for PSAPs
DHS S&T Expands Pilot of Cybersecurity Tech for Emergency Communications Centers
Alert: Microsoft Exchange Server FBI-CISA Update
Portals, Integrations and Applications
Who’s Watching the Watcher?
The Ten Most Devastating Cyber Attacks of 2020
SolarWinds Compromise CISA Update
State Actors – A Cyber Pandemic
4 Year Anniversary – Twitter TDoS Attack
Incidents from the Trenches
Cybersecurity on a Tight Budget
Be Prepared: Incident Response Planning For Your Agency
SIGRed Windows DNS Vulnerability
The Vicious Evolution of Cyber Attacks
FBI & CISA Cybersecurity Advisory on TOR
PaloAlto Vulnerability Requires Patch
Best Cyber Practices and Policies for Your Agency
The New Normal: COVID-19 Encourages NG911 & Cybersecurity
COVID-19, Elections, Taxes: How Hot Topics Impact Public Safety Cybersecurity
BYOD & Public Safety: Bring Your Own Doom?
DHS S&T Awards $750K to Maryland Company for Cybersecurity of Emergency Communicators
Reviewing the Worst Cyber Attacks of 2019
Addressing the Latest DHS Alerts
Preparing ECC Leadership for Cyber Attacks
Fixing the Top 5 Public Safety Vulnerabilities
IN THE NEWS: Hackers Are Hitting Government More, but That’s Nothing New
Should You Pay the Ransom?
Analyzing the Most Crippling Public Safety Cyber Attacks
SecuLore Solutions and Phishgoggles Announce Agreement
How to get Funding for 9-1-1 Cybersecurity
Why and How Public Safety is Under Cyber Attack
Microsoft RDP Flaw Requires Patch
The Seven Most Important Public Safety Cyber Policies
Preparing Public Safety for a Cyber Incident Response
Hackers Love Your Misconfigured Firewalls
DNS Infrastructure Tampering
2018: Reflecting on Cyber Attacks
Unusually High SMTP Traffic
Insider Threats and Their Impact on 9-1-1
Protecting Our 9-1-1 Centers From Targeted Cyber Attacks
Critical Vulnerability in 802.11 (Wi-Fi) Protocol
Elections are Coming: So are Advanced Persistent Threats
The Resurgence of Ransomware & Its Impact On Public Safety
Emotet – Old Malware Gets a New Face
Critical Oracle Database Server Vulnerability
Protecting Public Safety Against TDoS/DDoS Attacks
What to Expect from a Yearly Vulnerability Assessment
Securing Your Public Safety Agency: Critical Rules and Approaches
IN THE NEWS: Local governments a growing target for cyberattacks
Secure Communications: The Hacker’s Dream
IN THE NEWS: Local Governments Must Remain Vigilant Against Constant Cyberattack Attempts
ESInet: The Six Cybersecurity Challenges
Crypto-Mining: A Rising Threat to Public Safety
IN THE NEWS: Maryland cybersecurity company SecuLore Solutions is helping to assess the state’s 911 system
State Of Maryland To Assess The Reliability And Security Of Its 911 Network Infrastructure
SecuLore Solutions’ Alex Lorello Recognized as a Next-Generation Leader in the Communications Technology Industry by IWCE
Your Secret Admirers: Hackers Love Your DNS
A Year in Reflection: 2017
New Insights: The 2016 Thanksgiving Cyber Attack
Watch Out For New Scarab Ransomware
Critical Vulnerabilities in Google Chrome 2017
Hackers Gone Wild: How Cybercriminals Impact 9-1-1 Systems
TDoS & DDoS – How Cyber Thugs Can Shut Down 9-1-1 and What to Do About It
Take Charge of Your Cybersecurity
SecuLore Solutions Unveils New Version of Paladin™ at APCO 2017
How Hackers Infiltrate Our Public Safety Infrastructure
Is the Internet of Things a Boon or Bane for Public Safety?
The Latest Cyber Attacks on Our Public Safety Infrastructure
Lessons Learned from the 2016 Thanksgiving PSAP Cyber Attack
What Does a Public Safety Official Need to Do to Stay Cyber Safe?
How to Defend Public Safety from Russian Cyber Hacking
How to Defend Public Safety from Ransomware
IN THE NEWS: Check out the 12 finalists for this year’s Pitch Across Maryland competition