The eSentire Blog

Threat Intelligence

4 M

Why the Travelex Incident Portends the Changing Nature of Ransomware

Originally posted in Infosecurity Magazine January 29, 2020 Like most New Year’s resolutions, most go off the…

READ NOW →

Attacks/Breaches

5 M

Trouble at Travelex

Like most New Year’s resolutions, most go off the rails by February. The hackers behind the Travelex attack didn’t…

READ NOW →

Threat Response Unit

4 M

Oh Snap!: New Ostap Variant Observed in the Wild

As Emotet’s apparent hiatus continues, new malspam campaigns have risen to take its place (including a strange…

READ NOW →

Threat Response Unit

5 M

Threat actors using HEX encoded links to bypass phishing defenses

Overview: Recently eSentire Threat Intelligence observed an increase in credential phishing pages hosted on…

READ NOW →

Cybersecurity Strategy

4 M

The big enterprise security problem posed by small – or at least smaller – businesses

As originally posted on Enterprise CIO As the threat level grows and diversifies, global enterprises continue to…

READ NOW →

AI/ML

5 M

Opinion: AL and ML choices can dramatically impact data security

As originally posted on Information Management on December 24, 2018As networks have advanced in complexity, so…

READ NOW →

Threat Intelligence

4 M

Unpacking the Marriott data breach

The Marriott announcement of unauthorized access to the Starwood guest reservation database amounts to one of the…

READ NOW →

Cybersecurity Strategy

6 M

Manufacturing must adapt to emerging cybersecurity technology and threats

At the National Association of Manufacturers’ (NAM) board meeting, guest speaker Ron Moultrie leveraged his career…

READ NOW →

Threat Intelligence

3 M

eSentire observes an increase in exploitation attempts against routers

On July 19, 2018, eSentire observed an increase in exploitation attempts targeting Small-Office/Home Office (SOHO)…

READ NOW →

Threat Intelligence

6 M

Living off the land: the command and control phase

This is the fifth and final blog post in the Living Off the Land blog series. In this edition, the focus is on how…

READ NOW →

Threat Intelligence

11 M

Living off the land: the exploitation phase

This is the fourth blog post in a series discussing Living Off the Land tools and techniques. Successful…

READ NOW →

Threat Intelligence

6 M

Living off the land: the delivery & installation phases

This is the third installment of the Living Off the Land blog series. This section will focus on the Delivery and…

READ NOW →
Page
of 22