Combine AI-driven security operations, multi-signal attack surface coverage and 24/7 Elite Threat Hunters to help you take your security program to the next level.
Get unlimited Incident Response with threat suppression guarantee - anytime, anywhere.
CTEM and advisory programs that identify security gaps and build proactive strategies to address them.
Multi-agent Generative AI system embedded across eSentire’s Security Operations platform to scale human expertise.
Extended Detection andOpen XDR with Agentic AI & machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Customer PortalSee what our SOC sees, review investigations, and see how we are protecting your business.
Platform IntegrationsSeamless integrations and threat investigation across your existing tech stack.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
Threat Response Unit (TRU)Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.
Cyber Resilience TeamExtend your team capabilities and prevent business disruption with expertise from eSentire.
Response and RemediationWe balance automated blocks with rapid human-led investigations to manage threats.
Flexible MDR pricing and packages that fit your unique security requirements.
Entry level foundational MDR coverage
Comprehensive Next Level eSentire MDR
Next Level eSentire MDR with Cyber Risk Advisors to continuously advance your security program
Stop ransomware before it spreads.
Identity ResponseStop identity-based cyberattacks.
Zero Day AttacksDetect and respond to zero-day exploits.
Cybersecurity ComplianceMeet regulatory compliance mandates.
Third-Party RiskDefend third-party and supply chain risk.
Cloud MisconfigurationEnd misconfigurations and policy violations.
Cyber RiskAdopt a risk-based security approach.
Mid-Market SecurityMid-market security essentials to prioritize.
Sensitive Data SecurityProtect your most sensitive data.
Cyber InsuranceMeet insurability requirements with MDR.
Cyber Threat IntelligenceOperationalize cyber threat intelligence.
Security LeadershipBuild a proven security program.
THE THREAT On October 15th, 2025, F5 disclosed that the organization was impacted by a breach involving an unspecified state-sponsored threat actor. The threat actors were…
THE THREATOn October 4th, 2025 Oracle released a security advisory addressing a critical, zero-day vulnerability impacted its E-Business Suite (EBS), identified during their investigation…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
About Us Leadership CareersWe provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Search our site
Multi-Signal MDR with 300+ technology integrations to support your existing investments.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
We offer three flexible MDR pricing packages that can be customized to your unique needs.
The latest security advisories, blogs, reports, industry publications and webinars published by TRU.
Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.
See why 2000+ organizations globally have chosen eSentire for their MDR Solution.
Earlier this month, networking technology and service provider Ubiquiti (NASDAQ:UBNT) filed a report with the U.S. Securities and Exchange Commission (SEC) disclosing a significant attack worth US $46.7 million. The haul was acquired through a new and increasingly popular attack technique targeting top-level corporate execs.
These kinds of attacks may seem like a new trend, however they’ve actually been around for some time. This particular case is significant due to the magnitude of the attack. According to Ubiquiti’s website, the company reported fourth-quarter earnings of $44.1 million (on June 30, 2015). This attack effectively wiped out those earnings.
At eSentire, our incident response team has investigated many variants of these types of phishing attacks. In most cases the victim organizations didn’t know anything had happened until they detected irregularities in their balances. Without continuous detection and intervention, it’s practically impossible to avoid these types of targeted attacks as they’ve fast become the attack of choice.
While phishing scams require more time and effort to execute, cybercriminals have found incredible success, regardless of an enterprise’s size, scope or industry. The most common kind of attacks that eSentire sees are of the “six figure” variety which provide a hefty reward for a reasonable output of effort. These kind of attacks are not only a nuisance to the victim but they’re also quite embarrassing. The attackers are highly effective and know the meaning of the term “pigs get fat, hogs get slaughtered”.
Targeted attacks take advantage of the single greatest weakness within the enterprise - the employee. You absolutely can’t “patch” every employee with cybersecurity training. Regardless of how cyber-savvy your employees become, cybercriminals prey on the fact that inevitably, an employee will click a malicious link or unintentionally engage in a phishing attack – executive level included. Hackers take advantage of basic human nature and the fact that today, employees are busy, distracted and easily duped through feigned familiarity, flattery or appeals to their vanity.
In the case of Ubiquiti, scammers were able to successfully spoof corporate emails, leading to a multi-phase fund transfers spanning international jurisdictions. In the last year alone, the volume of cases related to this attack style have been on the rise and highlight an emerging trend targeting businesses regularly working with international suppliers or foreign trade partners.
Ubiquiti - through the assistance of banking partners and law enforcement - has so far recovered $8.1 million since the initial breach was discovered in early June. Company officials are hopeful that through continued legal proceedings they will recover another $6.8 million.
The resulting investigation concluded that internal controls over financial reporting were ineffective due to one or more material weaknesses. The report filed with the SEC highlights that the company continues to implement additional procedures and controls as a result of the investigation. While there has been no discussion of regulatory action specific to this case, the online brokerage industry has seen recent enforcement actions for failure to effectively protect infrastructure under what the SEC refers to as “The Red Flag Rule”.
At the end of the day, this style of attack can drain your bank account, wipe out earnings and cause reputational damage. Not to mention the disruption to regular business operations that could be ignited by regulatory practices and procedures investigations.
Is it all doom and gloom? Maybe not. It depends on what actions you take to defend against these kinds of attacks. Noted cybersecurity author Brian Krebs highlighted the architecture of a Business Email Compromise (BEC) in a recent article detailing the Ubiquiti attack. BEC attacks vary from traditional phishing attacks in that cybercriminals target decision-making executives through careful and thoughtful research netting access to corporate email accounts.
Once they gain access, they troll communications looking for keywords and triggers that help them to craft the accurate messaging that will ultimately launch the transfer attempt. These sorts of attacks are highly complex and require special attention from attackers. This high-touch mode of attack also means that the attacker can pivot the techniques they use to evade detection from traditional spam filters. In spite of the effort required to launch this kind of attack, the rewards are quite lucrative.
Preventing every possible scenario is virtually impossible and any cybersecurity expert claiming otherwise is either exaggerating or lying. While unpreventable, you can dramatically reduce risk by ensuring someone is designated to watch for the signs of suspicious activity inside your corporate network.
This type of continuous monitoring requires the deployment of a rich platform of network forensic tools, with capabilities like sophisticated packet-level detection. eSentire provides Active Threat Protection, which is delivered as a continuous 24x7x365 service. The Intelligence and Defence contractor communities developed these very sophisticated capabilities a number of years ago to deal with nation state adversaries. Several of these capabilities have made their way into commercial offerings from firms including RSA and Palantir. They’re costly but certainly within reach of Fortune 50-sized budgets. They also require a sophisticated, operational skillset, which is scarce in most markets.
The reality is that you don’t know what you don’t know. Therefore it’s essential that all traffic is reviewed at a granular level. Security information event management technology – the popular go-to in compliance-driven environments – attempts to derive threat indicators from security event logs (Syslog and Windows Event Logs) which deliver a very terse set of facts. While still useful they have limited efficacy in the current threat landscape in terms of detecting whether something bad is happening in time for you to react to it. The same devices that are collecting log information are missing these new attacks. If the attack is missed, it won’t be logged.
eSentire employs methodologies utilized by the Intel and Defence. At the core of these methodologies is the recognition for a rich data set. The only way to collect entire data sets is with full-packet capture. Once full-packet capture is underway, the data must be rapidly and efficiently interrogated in order to investigate atypical events or anomalous behaviors. This involves complex pattern matching, IP reputation testing, correlating to known indicators of compromise and performing elapsed time behavior analysis. Due to the ever increasing use of TLS/SSL, having the ability to monitor the contents of encrypted traffic is incredibly important.
The downside of this approach is the expense; it requires a lot of CPU, ample storage and complex software. Now, the your threat needle lives in a much larger haystack than when compared to the old SIEM-based approach. While these technologies can be highly effective at identifying candidate threats, you need a skilled human analyst to perform the last mile of investigation and correlation.
At eSentire our sensors and SOC analytics automatically detect and respond to all but the last 0.0015% of security events. For these complex anomalies eSentire “grey matter” intervenes to perform the last leg of correlation. This proven technique is highly effective when confronted with advanced targeted attacks like the Ubiquiti case.
This formula can be replicated in-house by combining advanced cybersecurity expertise, tools, an A-team of threat analysts and a multi-million dollar budget. However countless organizations lack the budget and resources to assemble an internal SOC. eSentire provides this and more to mid-sized organizations as a service.
eSentire is a trusted security provider, protecting over $2.5 trillion of assets protected globally 24x7x365. Contact eSentire to learn how Active Threat Protection can help you avoid the headlines.
To learn how your organization can build cyber resilience and prevent business disruption with eSentire’s Next Level MDR, connect with an eSentire Security Specialist now.
GET STARTED