The eSentire Blog

Threat Response Unit

14 M

eSentire Threat Intelligence Malware Analysis: HermeticWiper & PartyTicket

Recently, there have been multiple reports of new wiper malware observed targeting Ukrainian organizations as part…

READ NOW →

Threat Response Unit

14 M

Conti Affiliate Exposed: New Domain Names, IP Addresses and Email Addresses Uncovered

A Cobalt Strike Cybercrime Syndicate and the Ransomware Hackers’ Favorite Weapon On March 9, the Cybersecurity…

READ NOW →

Threat Response Unit

12 M

Analysis of Leaked Conti Intrusion Procedures by eSentire’s Threat Response Unit (TRU)

As defenders, often our only insight into an adversary’s tradecraft is gleaned through an analysis of…

READ NOW →

TRU Positive/Bulletin

3 M

Exploitation of VMware Horizon Servers by TunnelVision Threat Actor

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

4 M

IcedID to Cobalt Strike In Under 20 Minutes

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

3 M

Increase in Emotet Activity and Cobalt Strike Deployment

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

3 M

Machine-Learning Powered PowerShell Classifier Identifies Persistent SolarMarker Infect...

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

2 M

Remcos RAT

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

3 M

Gootloader Identified at Legal Services Firms in Drive-By Attacks

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Threat Response Unit

3 M

What You Need to Know About Log4j

Apache Log4j is a Java logging framework, highly prevalent in commercial and open-source software. Log4j is…

READ NOW →

Threat Response Unit

5 M

Ongoing Exploitation of the Log4j Vulnerabilities

On December 9th, Apache confirmed a critical zero-day vulnerability impacting the Log4j Java-based logging library…

READ NOW →

TRU Positive/Bulletin

3 M

Machine-Learning Powered BlueSteel and MDR for Endpoint Prevent Takeover by Coinmining ...

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →
Page
of 18