The eSentire Blog

Threat Intelligence

6 M

Don’t Get Reeled into a Phishing Scam

It’s an age-old story: you open an email sent from your bank notifying you of suspicious activity in your account…

READ NOW →

TRU Positive/Bulletin

3 M

ProxyShell Microsoft Exchange Vulnerabilities Exploited

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Threat Response Unit

4 M

PetitPotam NTLM Relay Attack

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Zero-Days

4 M

PrintNightmare Zero-Day Vulnerability Leaked

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Threat Intelligence

2 M

Vulnerable Supply-Chain Software and George Santayana

“Those who cannot remember the past are condemned to repeat it.” It’s a fact: All non-trivial software code…

READ NOW →

Threat Intelligence

5 M

Is History Repeating Itself with the Latest Kaseya VSA Compromise?

On July 2, 2021, REvil (a.k.a. Sodinokibi), the Russia-affiliated ransomware-as-a-service group, exploited…

READ NOW →

TRU Positive/Bulletin

3 M

Solarmarker Shifts Infrastructure in Recent Drive-By Attacks

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

3 M

Agent Tesla Identified Using Machine Learning PowerShell Classifier

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Threat Intelligence

5 M

Manufacturer Recovers from Costly Ransomware Attack

This blog was originally published on CyFIR.com and has been reposted as-is here following eSentire’s acquisition…

READ NOW →

Threat Intelligence

5 M

How cyber resilience addresses the greatest myth in cybersecurity.

This blog was originally published on CyFIR.com and has been reposted as-is here following eSentire’s acquisition…

READ NOW →

TRU Positive/Bulletin

3 M

Popular Remote Access Trojan Identified Through Threat Hunting Activities

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

4 M

IcedID Malware

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →
Page
of 22