The eSentire Blog

Threat Response Unit

7 M

eSentire Threat Intelligence Malware Analysis: DoubleZero

DoubleZero is a newly emerging destructive malware targeting Ukrainian enterprises. The initial access vector is…

READ NOW →

Company News

4 M

eSentire named to the 2022 Canada’s Top Small & Medium Employers List

We are thrilled to announce that eSentire has been named to Mediacorp Canada Inc.’s 2022 Canada’s Top Small &…

READ NOW →

Threat Response Unit

6 M

eSentire Threat Intelligence Malware Analysis: CaddyWiper

First discovered by ESET researchers in March 2022, CaddyWiper malware is a new type of wiper malware used by…

READ NOW →

TRU Positive/Bulletin

4 M

Suspected AsyncRAT Delivered via ISO Files Using HTML Smuggling Technique

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters…

READ NOW →

Threat Response Unit

14 M

eSentire Threat Intelligence Malware Analysis: HermeticWiper & PartyTicket

Recently, there have been multiple reports of new wiper malware observed targeting Ukrainian organizations as part…

READ NOW →

Threat Response Unit

14 M

Conti Affiliate Exposed: New Domain Names, IP Addresses and Email Addresses Uncovered

A Cobalt Strike Cybercrime Syndicate and the Ransomware Hackers’ Favorite Weapon On March 9, the Cybersecurity…

READ NOW →

Threat Response Unit

12 M

Analysis of Leaked Conti Intrusion Procedures by eSentire’s Threat Response Unit (TRU)

As defenders, often our only insight into an adversary’s tradecraft is gleaned through an analysis of…

READ NOW →

Cybersecurity Strategy

6 M

What to Know Before You Pay the Ransom

There’s no doubt that the thought of having their company featured in national headlines as a victim of yet…

READ NOW →

Cybersecurity Strategy

3 M

Test Your Cybersecurity Defenses with Penetration Testing and Red Team Exercises

Today’s cyberattacks are unlike those from twenty, thirty years ago. When ransomware attacks were first…

READ NOW →

TRU Positive/Bulletin

3 M

Exploitation of VMware Horizon Servers by TunnelVision Threat Actor

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Sensitive Data Protection

8 M

Understanding Sensitive Data Risks and Securing Your Crown Jewels

Data is the lifeblood of today’s enterprises. No matter an organization’s size, specialization, or sector, its…

READ NOW →

Company News

2 M

Know Better, Do Better: How eSentire is Breaking the Bias for International Women’s Day...

On March 8, we celebrate International Women’s Day (IWD) – a tradition over 100 years old highlighting the social,…

READ NOW →
Page
of 52