The eSentire Blog

Regulatory Compliance

5 M

Equifax cybersecurity breach will trigger regulatory reform

For industry observers, watching the Equifax breach unfold is like watching a slow-motion train wreck. For nearly…

READ NOW →

Threat Intelligence

5 M

Natural disasters threaten more than just physical security

Natural disasters aren’t wholly dedicated to any single season. Tornadoes can occur at any time, but generally…

READ NOW →

Threat Intelligence

3 M

New cyber threat intelligence suggests a rise in phishing-based attacks

We’ve recently released the 2017 Q2 Threat Summary Report, which analyzes threat types, volume, and preferred…

READ NOW →

Threat Intelligence

3 M

A closer look at Petya's / NotPetya's network spreading code

The file encryption and MBR infection code of NotPetya has now been carefully scrutinized and found lacking in…

READ NOW →

Threat Intelligence

5 M

Threat intelligence analysis: Petya/NotPetya malware outbreak update

eSentire has been closely monitoring the Petya/NotPetya malware outbreak this week. Our threat lab has learned…

READ NOW →

Threat Intelligence

4 M

Everything you need to know about GoldenEye

eSentire is closely monitoring the Petya (AKA GoldenEye) ransomware outbreak currently impacting businesses and…

READ NOW →

Threat Intelligence

5 M

Cyber threats 101: how to prevent file-based malware and botnets

Malware is malicious code that’s used to obtain unrestricted access to a victim machine. This makes the ability to…

READ NOW →

Threat Intelligence

10 M

DoS 2.0

As a firm, eSentire is dedicated to delivering 24x7 managed detection and response services to mid-sized…

READ NOW →

Threat Intelligence

14 M

Cyber threat study highlights mid-market weak spots

Cybercrime has become prolific. The complexity of attacks and the armies of threat actors driving those attacks…

READ NOW →

Ransomware

9 M

Malware 101: what you need to know about ransomware

What is Ransomware? Ransomware is a form of malware, which is software used to get unrestricted access to a…

READ NOW →

Attacks/Breaches

7 M

Why attribution of hacks like the recent DNC hack is so difficult

When solving crimes in the physical world, law enforcement agencies face significant challenges. Witness testimony…

READ NOW →

Managed Risk Programs

7 M

The employee who clicks on a spear-phishing link is the real danger

Employees represent the most significant vulnerability within any organization when it comes to cybersecurity.…

READ NOW →
Page
of 22