The eSentire Blog

Company News

5 M

eSentire Named in 2024 Waterloo Area's Top Employers List for Seventh Consecutive Year

We are thrilled to be named to the 2024 Waterloo Area’s Top Employers list for the seventh consecutive year. This…

READ NOW →

TRU Positive/Bulletin

6 M

Unveiling Parallax RAT: A Journey from Infection to Lateral Movement

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Managed Risk Programs

6 M

The Rise of QR Code Phishing Attacks and Best Practices for Interacting with QR Codes

Since the onset of the COVID-19 pandemic, most businesses across a wide range of industries have begun using Quick…

READ NOW →

TRU Positive/Bulletin

21 M

eSentire Threat Intelligence Malware Analysis: SolarMarker: To Jupyter and Back

Key Takeaways SolarMarker uses process injection to run the hVNC and data staging payload.The actors behind…

READ NOW →

Third-Party Cyber Risk

10 M

Why Manufacturing Organizations Need to Embrace the Microsoft Security Tools for 24/7 T...

For manufacturing organizations, the introduction of Industry 4.0 and rapid digital transformation have led to…

READ NOW →

Attacks/Breaches

7 M

What Does Materiality Really Mean in a Cyberattack?

For the Mr. Cooper Group, materiality may have reached its “Taylor Swift” moment On October 31, 2023, a mortgage…

READ NOW →

Threat Response Unit

9 M

The Notorious ALPHV/BlackCat Ransomware Gang is Attacking Corporations and Public Entit...

Security researchers with eSentire, a top global cybersecurity solutions provider, are warning that…

READ NOW →

TRU Positive/Bulletin

9 M

From DarkGate to DanaBot

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →
8 M

NetWire RAT: The Stealthy Invasion via Frenchy Shellcode

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

8 M

WinSock File Transfer Protocol Vulnerability Exploited

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

20 M

Nitrogen Campaign 2.0: Reloads with Enhanced Capabilities Leading to ALPHV/BlackCat Ran...

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →
9 M

The Wiki-Slack Attack

What do you get when you share a Wikipedia link on Slack? As eSentire Threat Response Unit (TRU) security…

READ NOW →
Page
of 53