The eSentire Blog

Threat Intelligence

5 M

Gray War: Deterrence by Cyber Denial

In part one of “Gray War” I looked at the threats posed by gray zones looking to destabilize our economy by…

READ NOW →

Threat Intelligence

5 M

Gray War: The Cyber Cold War

For the most part, nation states or state-sponsored actors don’t generally appear on our security operations…

READ NOW →

Threat Intelligence

4 M

Managing Cyber Risk for Manufacturers Amid COVID-19

Originally posted in Industry Today June 19, 2020 Modern manufacturing faces a seemingly endless slew of threats.…

READ NOW →

Threat Response Unit

3 M

Insights and Observations: U.K. Threat Intelligence Spotlight

eSentire’s second U.K. Threat Intelligence Spotlight focuses on trends observed across our U.K. customer base over…

READ NOW →

Threat Intelligence

4 M

Your Endpoints Need a Strong Defense Team

Understand attacker behavior to effectively hunt endpoint threats There’s one undeniable constant in endpoint…

READ NOW →

Threat Intelligence

4 M

How Current Ransomware Tactics Look

You can’t rush the process of smoking a brisket, what I consider the peak of BBQ prowess. For a 15-pound brisket,…

READ NOW →

Threat Intelligence

4 M

Avoid Being Hit by a “Zoombomb”

This week, the eSentire Threat Intelligence team released an advisory about software vulnerabilities and the…

READ NOW →

Threat Intelligence

8 M

New BOLO: Phishing Attacks that Customize O365 Pages with Your Branding

Phishing actors continue to deploy convincing Office 365 phishing attacks by hosting pages on trusted cloud…

READ NOW →

Threat Intelligence

4 M

Why the Travelex Incident Portends the Changing Nature of Ransomware

Originally posted in Infosecurity Magazine January 29, 2020 Like most New Year’s resolutions, most go off the…

READ NOW →

Threat Intelligence

3 M

Now Available: eSentire's 2019 Annual Threat Intelligence Report

Released today, eSentire’s 2019 Threat Intelligence Report: Perspectives from 2019 and Predictions for 2020…

READ NOW →

Threat Intelligence

2 M

Iran Cyber Threat Perspectives

We operate in a constantly connected and virtual world where politics, economics and business are intertwined like…

READ NOW →

Threat Intelligence

2 M

eSentire Threat Intelligence Spotlight: The Shifting Framework of Modern Malware

Modern malware is increasingly sophisticated. While newer antivirus solutions provide a more effective layer of…

READ NOW →
Page
of 24