What We Do
How We Do
Resources
Company
Partners
Get Started

The eSentire Blog

Feb 28, 2024

XRed Backdoor: The Hidden Threat in Trojanized Programs

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Posts from TRU Intelligence Center

Cybersecurity Strategy

5 M

2024 Cybersecurity Predictions: Navigating the Evolving Threat Landscape

As we make our way into 2024, it's clear that security leaders are navigating an increasingly complex landscape.…

READ NOW →
21 M

Rhysida Ransomware Group, Which Crippled the British Library Racking Up £6 to £7 Millio...

On October 31, 2023, the Rhysida Ransomware Group launched a crippling attack on the British Library. Although the…

READ NOW →

TRU Positive/Bulletin

18 M

Blind Eagle's North American Journey

Key takeaways: Ande Loader is utilized in this campaign to deliver the final payloads: Remcos RAT and NjRAT.Blind…

READ NOW →

TRU Positive/Bulletin

11 M

Technical Analysis of DarkVNC

DarkVNC is a hidden utility based on the Virtual Network Computing (VNC) technology, initially promoted on an…

READ NOW →
6 M

The Future of Cloud Security: What to Expect in 2024

As we move into 2024, cloud security stands at the forefront of business strategy. Based on the Cost of a Data…

READ NOW →

TRU Positive/Bulletin

3 M

The Oncoming Wave of SolarMarker

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →
5 M

From OnlyDcRatFans to RemcosRAT

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

4 M

Coinminer on a Vulnerable Tomcat Server

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →
14 M

Understanding Managed SOC Pricing: Everything You Need to Know About Security Operation...

In today's evolving threat landscape, protecting your organization's sensitive data and infrastructure is…

READ NOW →
Page
of 43