The eSentire Blog

Threat Intelligence

4 M

The SolarWinds supply chain compromise (Part 2):

In our recent post about the SolarWinds “Sunburst” supply chain compromise, we examined the importance of…

READ NOW →

Threat Intelligence

9 M

The SolarWinds supply chain compromise:

Even in a year as eventful as 2020, the SolarWinds supply chain breach is making headlines around the world due to…

READ NOW →

Threat Response Unit

4 M

Hands-on Threat Research Leads to Resilient Zerologon Detection

Even in the all-too-plentiful world of vulnerabilities and exploits, CVE-2020-1472 (aka Zerologon) is special,…

READ NOW →

Threat Response Unit

6 M

The SunWalker Incident: Netwalker and SunCrypt Ransomware Double-Double Exploitation

Summary: After eight long hours attempting to siege an online education institution – including initial access,…

READ NOW →

Threat Intelligence

7 M

Capital One Ruling

Why Capital One was forced to disclose its incident report in data breach lawsuitThis blog summarizes the webinar…

READ NOW →

Threat Intelligence

4 M

Gray War: The Cyber Cold War

For the most part, nation states or state-sponsored actors don’t generally appear on our security operations…

READ NOW →

Threat Intelligence

3 M

Avoid Being Hit by a “Zoombomb”

This week, the eSentire Threat Intelligence team released an advisory about software vulnerabilities and the…

READ NOW →

Threat Intelligence

6 M

New BOLO: Phishing Attacks that Customize O365 Pages with Your Branding

Phishing actors continue to deploy convincing Office 365 phishing attacks by hosting pages on trusted cloud…

READ NOW →

Threat Intelligence

3 M

Why the Travelex Incident Portends the Changing Nature of Ransomware

Originally posted in Infosecurity Magazine January 29, 2020 Like most New Year’s resolutions, most go off the…

READ NOW →

Attacks/Breaches

4 M

Trouble at Travelex

Like most New Year’s resolutions, most go off the rails by February. The hackers behind the Travelex attack didn’t…

READ NOW →

Threat Response Unit

3 M

Oh Snap!: New Ostap Variant Observed in the Wild

As Emotet’s apparent hiatus continues, new malspam campaigns have risen to take its place (including a strange…

READ NOW →

Threat Response Unit

4 M

Threat actors using HEX encoded links to bypass phishing defenses

Overview: Recently eSentire Threat Intelligence observed an increase in credential phishing pages hosted on…

READ NOW →
Page
of 22