Combine cutting-edge XDR technology, multi-signal threat intelligence and 24/7 Elite Threat Hunters to help you build a world-class security operation.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Cyber risk and advisory programs that identify security gaps and build security strategies to address them.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
XDR with machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Seamless integration and threat investigation across your existing tech stack.
Defend brute force attacks, active intrusions and unauthorized scans.
Guard endpoints by isolating and remediating threats to prevent lateral spread.
Investigation and threat detection across multi-cloud or hybrid environments.
Remediate misconfigurations, vulnerabilities and policy violations.
Investigate and respond to compromised identities and insider threats.
Stop ransomware before it spreads.
Meet regulatory compliance mandates.
Detect and respond to zero-day exploits.
End misconfigurations and policy violations.
Defend third-party and supply chain risk.
Prevent disruption by outsourcing MDR.
Adopt a risk-based security approach.
Meet insurability requirements with MDR.
Protect your most sensitive data.
Build a proven security program.
Operationalize timely, accurate, and actionable cyber threat intelligence.
THE THREATA recently disclosed vulnerability impacting Zimbra mail servers is being actively exploited by attacker(s). On September 27th, Zimbra publicly disclosed CVE-2024-45519, a…
Sep 17, 2024THE THREAT Technical details and Proof-of-Concept (PoC) exploit code for the critical Ivanti Endpoint Manager (EPM) vulnerability CVE-2024-29847 are now publicly available.…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Multi-Signal MDR with 300+ technology integrations to support your existing investments.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
Three MDR package tiers are available based on per-user pricing and level of risk tolerance.
The latest security advisories, blogs, reports, industry publications and webinars published by TRU.
Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.
See why 2000+ organizations globally have chosen eSentire for their MDR Solution.
Sonic drive-in is one of the latest victims in a long line of recent cybersecurity breaches. The fast food restaurant, which has 3,600 locations across 45 states, has acknowledged a breach affecting an unknown number of store payment systems, potentially affecting millions of people.
In mid-September, Sonic was notified of unusual activity involving cards used at their restaurants by their credit card processor. To shed more light on the situation, KrebsonSecurity reported a recent dump of credit card info on a dark web credit card market called Joker's Stash, which contained card numbers recently used at Sonic.
In these underground cybercrime stores, KrebsonSecurity noted the cards advertised are priced somewhat higher than cards stolen in other breaches. He explains that this is likely because this batch of cards is still extremely fresh and have not yet been canceled by card-issuing banks.
What determines the price of a card on the dark web? Most range in price from $25 to $50—a number influenced by factors including the type of card issued (Amex, Visa, MasterCard, etc); the card’s level (classic, standard, signature, platinum, etc.); whether the card is debit or credit; and the issuing bank.[1]
How does this happen and are fast food chains particularly susceptible to cyberattacks? We’ve compiled some answers below.
Cybercriminals can steal credit card data from organizations that accept cards by hacking into their point-of-sale systems remotely. Once inside the system, they can install malicious software that copies account data stored on a card’s magnetic stripe. With this information, hackers can create counterfeit cards and either sell them or use them to purchase high-priced merchandise.
However, you could argue that Sonic’s less-than-perfect data protection management is not the only thing at fault. Financial institutions must also bear some of the blame for the way things are.
The United States is the last of the G20 nations to move to chip-based cards, which are far more expensive and difficult for criminals to counterfeit. Despite the clear evidence in favour of more secure, chip-based cards, many financial institutions still haven’t gotten around to replacing traditional magnetic stripe cards, which may help explain why this type of attack continues to occur.
Fast food chains, like retailers in general, are more susceptible to cyberattacks than other industries because of the multi-site, distributed model of their business. As it stands, many effective detection and response cybersecurity defenses come with six-figure price tags, which goes well beyond the budget of most franchise owners. Therefore, each individual location (franchise or corporate) represents a potentially weak link in the fast food chain’s operations. This makes fast food chains a vulnerable and lucrative target, which is a recipe for victimization at the hands of cybercriminals who know they’re easier to breach than a large bank or insurance company.
Beyond standard PoS security, Sonic and other similar business should focus on the connections between the parent entity and the franchise, and monitor this traffic for indicators of compromise. Also placing controls on point-of-sale systems to prevent unwanted and potentially hazardous activity (web browsing or personal email viewing) greatly reduces the risk of compromise on mission critical systems. And of course, these companies should provide ongoing security awareness training to store location and headquarter employees.
As cyberthreats continue to evolve, businesses without adequate cybersecurity defenses will be attacked over and over again, affecting both revenue and reputation. With Managed Detection and Response, our SOC can be a great resource to monitor operations when you can’t do it all. We’ve got your back. Let us know what we can do to help.
eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization’s cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world’s most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit: www.esentire.com and follow @eSentire.