The eSentire Blog

Third-Party Cyber Risk

5 M

Policies, Prevention, and Promises: How to Protect Your Organization from Third-Party a...

Partnering with external suppliers and vendors is necessary for almost every business and can provide competitive…

READ NOW →

TRU Positive/Bulletin

3 M

AsyncRAT Activity

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Managed Detection and Response

2 M

eSentire is Part of the Gartner Peer Insights Customer First Program for Managed Detect...

We are excited to announce that eSentire has pledged to be a Customer First vendor in the Managed Detection and…

READ NOW →

Threat Response Unit

14 M

eSentire Threat Intelligence Malware Analysis: SolarMarker

Since first emerging in 2020, SolarMarker (aka: Jupyter, Polazert, Yellow Cockatoo) remains one of the most…

READ NOW →

TRU Positive/Bulletin

15 M

Hackers Spearphish Corporate Hiring Managers with Poisoned Resumes, Infecting Them with...

More_Eggs Came Calling for Easter eSentire’s security research team, the Threat Response Unit (TRU), has…

READ NOW →

Cybersecurity Strategy

5 M

Microsoft Rescues Acronym-Weary CISOs

For all the disruption the COVID-19 pandemic caused, it also served as a catalyst of sorts for CISOs that took…

READ NOW →

Cybersecurity Strategy

8 M

Become HIPAA Compliant Without Losing Focus from Cybersecurity

The pandemic, unending digital transformation, and unsympathetic cybercriminals have taken their toll on…

READ NOW →

TRU Positive/Bulletin

4 M

Fake Chrome Setup Leads to NetSupportManager RAT and Mars Stealer

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Threat Response Unit

4 M

Expect Aftershocks from the Ongoing Russian-Allied Cyber Threats

In January, the Cybersecurity and Infrastructure Security Agency (CISA) released an Alert (AA22-011A) outlining…

READ NOW →

TRU Positive/Bulletin

4 M

UpdateAgent macOS Malware

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters…

READ NOW →

Threat Response Unit

9 M

eSentire Threat Intelligence Malware Analysis: HeaderTip

Since humans are still the weakest link in cybersecurity, threat actor(s) continue to prey on fallible human…

READ NOW →

Threat Response Unit

7 M

eSentire Threat Intelligence Malware Analysis: DoubleZero

DoubleZero is a newly emerging destructive malware targeting Ukrainian enterprises. The initial access vector is…

READ NOW →
Page
of 52