The eSentire Blog

Threat Response Unit

10 M

Hackers Exploit Fortinet Devices to Spread Ransomware within Corporate Environments, Wa...

Summary In mid and late November 2022, eSentire detected and shut down hackers attempting to infect two of its…

READ NOW →

TRU Positive/Bulletin

6 M

Recent FakeBat Activity Observed in December 2022

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →
3 M

Creating Resilience Against Future Supply Chain Attacks

The very nature of the third-party relationships required in supply chain management presents the greatest…

READ NOW →

Cybersecurity Strategy

2 M

Cyber Resilience as a Component of Incident Response Planning

“We bend so that we don’t break.” – A Yoga saying I came across this saying earlier this week, and I thought it…

READ NOW →

TRU Positive/Bulletin

3 M

FortiOS - Authentication Bypass CVE-2022-40684

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Third-Party Cyber Risk

4 M

The Rising Threat of Cybersecurity for Retailers

Stores across the country have their holiday lights on display and retailers everywhere are gearing up for the…

READ NOW →

TRU Positive/Bulletin

18 M

eSentire Threat Intelligence Malware Analysis: Redline Stealer

Redline Stealer is one of the most popular stealers being sold and used by cybercriminals. The command and control…

READ NOW →

TRU Positive/Bulletin

5 M

GootLoader Striking with a New Infection Technique

On December 2, 2022, one of our 24/7 SOC Cyber Analysts escalated an incident involving the GootLoader malware at…

READ NOW →
4 M

eSentire Named in

We are thrilled to announce that eSentire has been named to the 2023 Waterloo Area’s Top Employers list for the…

READ NOW →

TRU Positive/Bulletin

8 M

Disrupting an Active Ransomware Attack Over the Course of Hours

Recently, eSentire’s Security Operations Center responded to a ransomware attack in progress. The attack was…

READ NOW →

Cybersecurity Strategy

6 M

Incident Response Plans and Tabletop Exercises May Be a Waste of Time

Suppose you have invested considerable time and money creating an Incident Response Plan (IRP) and delivering…

READ NOW →

AI/ML

3 M

AI’s Role in Cybersecurity

Artificial intelligence (AI) has been seen as having great potential since 1956. Based on computing algorithms…

READ NOW →
Page
of 52