The eSentire Blog

TRU Positive/Bulletin

9 M

GuLoader VBScript Variant Returns with PowerShell Updates

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

AI/ML

8 M

FakeBat Impersonates Midjourney, ChatGPT in Drive-by Cyberattacks

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

7 M

PaperCut Vulnerability Exploited to Deliver Cryptocurrency Miner to Education Sector Customer

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

22 M

eSentire Threat Intelligence Malware Analysis: Vidar Stealer

Vidar Stealer is an information stealer (infostealer) malware that first appeared on hacking forums at the end of…

READ NOW →

TRU Positive/Bulletin

12 M

Threat Actors Using Fake QuickBooks Software to Scam Organizations

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Ransomware

7 M

What is Malware-as-a-Service (MaaS)?

The cybercrime economy evolved rapidly in recent years. Gone are the days when threat actors were lonely hackers…

READ NOW →

TRU Positive/Bulletin

5 M

Protecting End Users Against the Gootloader Malware Threat Using the Gootloader Operator’s Own Tactics

eSentire’s Threat Response Unit (TRU), led by researchers Joe Stewart and Keegan Keplinger, have launched a…

READ NOW →

Vulnerability Scanning/Management

3 M

eSentire Named Tenable’s 2023 Top MSSP Partner in North America

eSentire is thrilled to be recognized as Tenable’s 2023 Top Managed Security Services Provider (MSSP) Partner in…

READ NOW →

Managed Detection and Response

5 M

eSentire Achieves Microsoft Verified Managed XDR Solution Status

We are excited to announce that eSentire has achieved Microsoft verified Managed Extended Detection and Response…

READ NOW →

Cybersecurity Strategy

6 M

Poor Cyber Defences Are Damaging Canada’s Economy

Cyberattacks may seem like relatively minor inconveniences to the average consumer. The reality is that such…

READ NOW →

Cybersecurity Strategy

9 M

Building a Cybersecurity Foundation to Protect Construction Firms from Ransomware Attacks

Construction firms are increasingly targets of cyber and ransomware attacks that lead to costly project delays and…

READ NOW →

Cybersecurity Strategy

7 M

Building Resiliency: Three Core Actions To Create Stronger Cybersecurity

This article is contributed by Ray Texter, Chief of Information Security at Texas United Management, and a…

READ NOW →
Page
of 51