The eSentire Blog

Threat Intelligence

3 M

How Current Ransomware Tactics Look

You can’t rush the process of smoking a brisket, what I consider the peak of BBQ prowess. For a 15-pound brisket,…

READ NOW →

Threat Intelligence

3 M

Avoid Being Hit by a “Zoombomb”

This week, the eSentire Threat Intelligence team released an advisory about software vulnerabilities and the…

READ NOW →

Threat Intelligence

6 M

New BOLO: Phishing Attacks that Customize O365 Pages with Your Branding

Phishing actors continue to deploy convincing Office 365 phishing attacks by hosting pages on trusted cloud…

READ NOW →

Threat Intelligence

3 M

Why the Travelex Incident Portends the Changing Nature of Ransomware

Originally posted in Infosecurity Magazine January 29, 2020 Like most New Year’s resolutions, most go off the…

READ NOW →

Threat Intelligence

2 M

Now Available: eSentire's 2019 Annual Threat Intelligence Report

Released today, eSentire’s 2019 Threat Intelligence Report: Perspectives from 2019 and Predictions for 2020…

READ NOW →

Threat Intelligence

1 M

Iran Cyber Threat Perspectives

We operate in a constantly connected and virtual world where politics, economics and business are intertwined like…

READ NOW →

Threat Intelligence

1 M

eSentire Threat Intelligence Spotlight: The Shifting Framework of Modern Malware

Modern malware is increasingly sophisticated. While newer antivirus solutions provide a more effective layer of…

READ NOW →

Threat Intelligence

2 M

2019 Post-ILTACON eSentire Recap

Disney played host last week to an international crowd of legal IT professionals at ILTACON 2019. The heat and…

READ NOW →

Threat Intelligence

3 M

2019 eSentire Threat Intelligence Spotlight: Legal Industry

Five years ago, at a major legal technology conference in New York City, the topic of cybersecurity was…

READ NOW →

Threat Response Unit

3 M

Oh Snap!: New Ostap Variant Observed in the Wild

As Emotet’s apparent hiatus continues, new malspam campaigns have risen to take its place (including a strange…

READ NOW →

Threat Response Unit

4 M

Threat actors using HEX encoded links to bypass phishing defenses

Overview: Recently eSentire Threat Intelligence observed an increase in credential phishing pages hosted on…

READ NOW →

Threat Intelligence

4 M

Cybersecurity as a collective issue: Bringing UK industry together

1. ‘First things first. Get the champagne.’ Winston Churchill, 1931, New York. Recently, eSentire and our…

READ NOW →
Page
of 23