The eSentire Blog

Threat Intelligence

2 M

eSentire’s Threat Intelligence Spotlight: United Kingdom

For several years, eSentire has published globally focused Threat Reports based on data from our Security…

READ NOW →

Threat Intelligence

4 M

Revisiting the 2018 threat forecast

In the 2017 Annual Threat Report, the eSentire Threat Intelligence team documented a series of scenarios that…

READ NOW →

Threat Intelligence

2 M

Highlights of eSentire's 2018 Annual Threat Report

eSentire’s 2018 Year End Threat Report offers an expansive overview of the threat landscape in 2018. The content…

READ NOW →

Threat Intelligence

3 M

Depth and Breadth: Logs help empower Managed Detection and Response delivery

We’ve all heard it, “it’s not a matter of if, but when.” This phrase is a marketing staple used to instill fear,…

READ NOW →

Threat Intelligence

3 M

Unpacking the Marriott data breach

The Marriott announcement of unauthorized access to the Starwood guest reservation database amounts to one of the…

READ NOW →

Threat Intelligence

2 M

eSentire observes an increase in exploitation attempts against routers

On July 19, 2018, eSentire observed an increase in exploitation attempts targeting Small-Office/Home Office (SOHO)…

READ NOW →

Threat Intelligence

5 M

Living off the land: the command and control phase

This is the fifth and final blog post in the Living Off the Land blog series. In this edition, the focus is on how…

READ NOW →

Threat Intelligence

3 M

Covert attack techniques growing in popularity

The eSentire Threat Intelligence team released their findings and analysis of cybersecurity incidents from the…

READ NOW →

Threat Intelligence

6 M

Living off the land: the exploitation phase

This is the fourth blog post in a series discussing Living Off the Land tools and techniques. Successful…

READ NOW →

Threat Intelligence

5 M

Living off the land: the delivery & installation phases

This is the third installment of the Living Off the Land blog series. This section will focus on the Delivery and…

READ NOW →

Threat Intelligence

5 M

Living off the land: the weaponization phase

This is the second blog in a series focusing on “Living Off the Land” tools. Each installment of this series…

READ NOW →

Threat Intelligence

5 M

Living off the land: the reconnaissance phase

This is the first blog post in a series exploring the use of Living Off the Land techniques.Each blog post will be…

READ NOW →
Page
of 23