The eSentire Blog

Threat Intelligence

4 M

Cyberattack types plaguing the healthcare industry

The healthcare industry is an attractive target for several reasons, each of which has some influence on the type…

READ NOW →

Threat Intelligence

3 M

What makes the healthcare industry so susceptible to cyberattacks?

With the number of recent data breaches and cyberattacks, the healthcare industry is no stranger to network…

READ NOW →

Threat Intelligence

3 M

EXIF data: a picture really is worth a thousand words

As technology continues to make the world more connected, privacy on the web is a growing concern. New innovations…

READ NOW →

Threat Intelligence

3 M

Distributed Denial of Service (DDoS) attack FAQs and important things to know

What is “DDoS”? DDoS, which stands for Distributed Denial of Service, is a type of cyberattack that attempts to…

READ NOW →

Threat Intelligence

2 M

Cyber threats: a holiday tradition

While shoppers are busy, so are opportunistic threat actors. The holiday season invariably includes great deals,…

READ NOW →

Threat Intelligence

3 M

Don't get run over by drive-by mining

Drive-by Mining is exploding in popularity, as it’s being adopted by both legitimate websites and criminal…

READ NOW →

Threat Intelligence

4 M

Whaling: phishing for bigger, more powerful targets

You’ve probably heard of phishing (and the damage its wreaking worldwide), but have you heard of whaling? In this…

READ NOW →

Threat Intelligence

4 M

Can your employees identify a phishing attack?

This article first appeared on SC Magazine UK.Phishing attacks are as popular as ever. According to report from…

READ NOW →

Threat Intelligence

4 M

Natural disasters threaten more than just physical security

Natural disasters aren’t wholly dedicated to any single season. Tornadoes can occur at any time, but generally…

READ NOW →

Threat Intelligence

2 M

New cyber threat intelligence suggests a rise in phishing-based attacks

We’ve recently released the 2017 Q2 Threat Summary Report, which analyzes threat types, volume, and preferred…

READ NOW →

Threat Intelligence

4 M

Digitization of patient records makes healthcare a prime cyber target

Cyber-attackers are attracted to organizations that store high-value information and have a low tolerance for…

READ NOW →

Threat Intelligence

2 M

A closer look at Petya's / NotPetya's network spreading code

The file encryption and MBR infection code of NotPetya has now been carefully scrutinized and found lacking in…

READ NOW →
Page
of 23