The eSentire Blog

TRU Positive/Bulletin

5 M

Suspected AsyncRAT Delivered via ISO Files Using HTML Smuggling Technique

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters…

READ NOW →

Threat Response Unit

16 M

eSentire Threat Intelligence Malware Analysis: HermeticWiper & PartyTicket

Recently, there have been multiple reports of new wiper malware observed targeting Ukrainian organizations as part…

READ NOW →

Threat Response Unit

15 M

Conti Affiliate Exposed: New Domain Names, IP Addresses and Email Addresses Uncovered

A Cobalt Strike Cybercrime Syndicate and the Ransomware Hackers’ Favorite Weapon On March 9, the Cybersecurity…

READ NOW →

Threat Response Unit

13 M

Analysis of Leaked Conti Intrusion Procedures by eSentire’s Threat Response Unit (TRU)

As defenders, often our only insight into an adversary’s tradecraft is gleaned through an analysis of…

READ NOW →

TRU Positive/Bulletin

5 M

Exploitation of VMware Horizon Servers by TunnelVision Threat Actor

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

5 M

IcedID to Cobalt Strike In Under 20 Minutes

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

4 M

Increase in Emotet Activity and Cobalt Strike Deployment

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

4 M

Machine-Learning Powered PowerShell Classifier Identifies Persistent SolarMarker Infect...

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

4 M

Remcos RAT

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

4 M

Gootloader Identified at Legal Services Firms in Drive-By Attacks

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Threat Response Unit

4 M

What You Need to Know About Log4j

Apache Log4j is a Java logging framework, highly prevalent in commercial and open-source software. Log4j is…

READ NOW →

Threat Intelligence

4 M

Why the Healthcare Industry is A Growing Target for Cybercriminals

In the end of October 2021, the Newfoundland and Labrador healthcare system was hit by the worst cyberattack in…

READ NOW →
Page
of 22