The eSentire Blog

TRU Positive/Bulletin

3 M

Resurgence in Qakbot Malware Activity

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Cybersecurity Strategy

4 M

How is the Cybersecurity Industry Shifting Gears? Three Experts Weigh In

For what seemed like the first time in a long time, cybersecurity industry professionals from around the world…

READ NOW →

TRU Positive/Bulletin

4 M

Socgholish to Cobalt Strike in 10 Minutes

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

9 M

eSentire Threat Intelligence Malware Analysis: PINGPULL RAT

PINGPULL is a Remote Access Tool (RAT) that is used as a new backdoor variant that allows threat actors to encrypt…

READ NOW →

Cyber Risk

7 M

Manage Your Cyber Risk By Conducting a Cybersecurity Maturity Assessment

Given how cyberattacks have evolved in the past few years, no organization has the luxury of forgoing cyber risk…

READ NOW →

TRU Positive/Bulletin

4 M

Emotet Malware Detected Through a Phishing Campaign

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

12 M

eSentire Threat Intelligence Malware Analysis: Purple Fox

Purple Fox malware was first discovered in 2018 and was delivered by RIG EK (Exploit Kit). However, it has now…

READ NOW →
2 M

eSentire Wins Editor’s Choice for Top MDR and IR Provider in 2022 Global Infosec Awards...

eSentire is proud to confirm that we have been named a top cybersecurity services provider and won two 2022 Global…

READ NOW →

TRU Positive/Bulletin

4 M

Gootkit Loader Returns to Deliver Cobalt Strike

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Threat Response Unit

4 M

The Popular Malware Downloader, GootLoader, Expands its Payloads Yet Again, Infecting a...

In an unreported first - GootLoader, a popular malware-as-a-service (MaaS) offering which leverages Search Engine…

READ NOW →
4 M

XDR: Separating Truth from “We Do That Too”

There’s no doubt that the cyber industry is inundated with security buzzwords: SIEM, SOAR, zero trust, MDR, XDR –…

READ NOW →
5 M

The Four Horsemen of Software Supply Chain Attacks

2022 is starting to look like the year of the supply chain attack. But why are threat actors so attracted to this…

READ NOW →
Page
of 53