The eSentire Blog

Cybersecurity Strategy

6 M

Key Learnings from the Newest Verizon DBIR and the Recent Dragos Attack

Within the past month, two extremely interesting sources of attack information were made public – the 16th annual…

READ NOW →

Cybersecurity Strategy

4 M

Why Critical Infrastructure Remains a Ransomware Target

There continues to be a lot of pressure on security leaders to do more with less, but today's sophisticated and…

READ NOW →

Ransomware

6 M

What is Malware-as-a-Service (MaaS)?

The cybercrime economy evolved rapidly in recent years. Gone are the days when threat actors were lonely hackers…

READ NOW →

TRU Positive/Bulletin

4 M

Protecting End Users Against the Gootloader Malware Threat Using the Gootloader Operato...

eSentire’s Threat Response Unit (TRU), led by researchers Joe Stewart and Keegan Keplinger, have launched a…

READ NOW →

Cybersecurity Strategy

5 M

Poor Cyber Defences Are Damaging Canada’s Economy

Cyberattacks may seem like relatively minor inconveniences to the average consumer. The reality is that such…

READ NOW →

Cybersecurity Strategy

8 M

Building a Cybersecurity Foundation to Protect Construction Firms from Ransomware Attac...

Construction firms are increasingly targets of cyber and ransomware attacks that lead to costly project delays and…

READ NOW →

Threat Response Unit

3 M

How Cybercriminals Can Exploit Silicon Valley Bank's Collapse for Phishing Attacks

In the span of one week, countless businesses within the tech industry have been impacted by the collapse of…

READ NOW →

Threat Intelligence

2 M

Tactical Experts Driving Success for Ransomware Gangs

Ten, twenty years ago, when you heard the word ‘ransomware’ it was because you (or someone you know) clicked a…

READ NOW →

Threat Response Unit

10 M

Hackers Exploit Fortinet Devices to Spread Ransomware within Corporate Environments, Wa...

Summary In mid and late November 2022, eSentire detected and shut down hackers attempting to infect two of its…

READ NOW →

Threat Intelligence

5 M

Will Counterattacks Stop Cybercriminals?

Cybersecurity is not an IT problem to solve—it's a business risk to manage. In the Managing Cyber Risk podcast…

READ NOW →

Threat Response Unit

14 M

Conti Affiliate Exposed: New Domain Names, IP Addresses and Email Addresses Uncovered

A Cobalt Strike Cybercrime Syndicate and the Ransomware Hackers’ Favorite Weapon On March 9, the Cybersecurity…

READ NOW →

Threat Response Unit

12 M

Analysis of Leaked Conti Intrusion Procedures by eSentire’s Threat Response Unit (TRU)

As defenders, often our only insight into an adversary’s tradecraft is gleaned through an analysis of…

READ NOW →
Page
of 5