The eSentire Blog

Threat Intelligence

3 M

Why the Healthcare Industry is A Growing Target for Cybercriminals

In the end of October 2021, the Newfoundland and Labrador healthcare system was hit by the worst cyberattack in…

READ NOW →

Threat Intelligence

6 M

Ep. 8: Learning from the Adversary

Cybersecurity is not an IT problem to solve—it's a business risk to manage. In the Managing Cyber Risk podcast…

READ NOW →

Threat Intelligence

4 M

Ep. 7: Security Awareness Training and Phishing Testing

Cybersecurity is not an IT problem to solve—it's a business risk to manage. In the Managing Cyber Risk podcast…

READ NOW →

Cybersecurity Strategy

5 M

Making the Case for Extended Detection and Response (XDR) for Cybersecurity and IT Oper...

Within the past two years, threat actors have leveraged more sophisticated tools to deploy cyberattacks on…

READ NOW →

Threat Response Unit

5 M

Ongoing Exploitation of the Log4j Vulnerabilities

On December 9th, Apache confirmed a critical zero-day vulnerability impacting the Log4j Java-based logging library…

READ NOW →

Cybersecurity Strategy

4 M

Cybersecurity Best Practices to Implement Before the Holidays

‘Twas the night before a ransomware attack… Your team might be getting ready to head out for the holidays, but…

READ NOW →

TRU Positive/Bulletin

3 M

Machine-Learning Powered BlueSteel and MDR for Endpoint Prevent Takeover by Coinmining ...

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Cybersecurity Strategy

8 M

Security Operations Center (SOC): Build or Buy?

Over the past year we have witnessed some truly destructive cyber attacks occurring on a global scale. Although…

READ NOW →

Cybersecurity Strategy

7 M

5 Elements of An Effective Phishing and Security Awareness Training (PSAT) Program

Regardless of the industry, a majority of cyberattacks occur due to a successful phishing attempt largely due to…

READ NOW →

TRU Positive/Bulletin

3 M

Dridex Excel Spam Feature

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

3 M

SolarMarker Delivered Via Google Groups Pages

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Managed Detection and Response

4 M

Microsoft Grows Big In Security With Partners

The cybersecurity game was never going to be the same once Microsoft made a serious play for the space, and this…

READ NOW →
Page
of 52