The eSentire Blog

Threat Intelligence

4 M

The SolarWinds supply chain compromise (Part 2):

In our recent post about the SolarWinds “Sunburst” supply chain compromise, we examined the importance of…

READ NOW →

Threat Intelligence

4 M

2021 Drops the Cyber from Cybercrime

Well, it’s that time of year. Time for the much-ballyhooed 2021 predictions. Time to stick our collective cyber…

READ NOW →

Threat Intelligence

9 M

The SolarWinds supply chain compromise:

Even in a year as eventful as 2020, the SolarWinds supply chain breach is making headlines around the world due to…

READ NOW →

Threat Response Unit

4 M

Hands-on Threat Research Leads to Resilient Zerologon Detection

Even in the all-too-plentiful world of vulnerabilities and exploits, CVE-2020-1472 (aka Zerologon) is special,…

READ NOW →

Threat Response Unit

6 M

The SunWalker Incident: Netwalker and SunCrypt Ransomware Double-Double Exploitation

Summary: After eight long hours attempting to siege an online education institution – including initial access,…

READ NOW →

Threat Intelligence

7 M

Capital One Ruling

Why Capital One was forced to disclose its incident report in data breach lawsuitThis blog summarizes the webinar…

READ NOW →

Threat Intelligence

3 M

Mitigating risk and navigating the evolving cyber-threat landscape

Originally posted in teiss July 21, 2020In a globally connected world, there are few professions not affected by…

READ NOW →

Threat Intelligence

4 M

Gray War: Deterrence by Cyber Denial

In part one of “Gray War” I looked at the threats posed by gray zones looking to destabilize our economy by…

READ NOW →

Threat Intelligence

4 M

Gray War: The Cyber Cold War

For the most part, nation states or state-sponsored actors don’t generally appear on our security operations…

READ NOW →

Threat Intelligence

3 M

Managing Cyber Risk for Manufacturers Amid COVID-19

Originally posted in Industry Today June 19, 2020 Modern manufacturing faces a seemingly endless slew of threats.…

READ NOW →

Threat Response Unit

2 M

Insights and Observations: U.K. Threat Intelligence Spotlight

eSentire’s second U.K. Threat Intelligence Spotlight focuses on trends observed across our U.K. customer base over…

READ NOW →

Threat Intelligence

3 M

Your Endpoints Need a Strong Defense Team

Understand attacker behavior to effectively hunt endpoint threats There’s one undeniable constant in endpoint…

READ NOW →
Page
of 23