What We Do
How We Do
Resources
Company
Partners
Get Started

The eSentire Blog

Third-Party Cyber Risk

9 M

Why Manufacturing Organizations Need to Embrace the Microsoft Security Tools for 24/7 T...

For manufacturing organizations, the introduction of Industry 4.0 and rapid digital transformation have led to…

READ NOW →

Attacks/Breaches

6 M

What Does Materiality Really Mean in a Cyberattack?

For the Mr. Cooper Group, materiality may have reached its “Taylor Swift” moment On October 31, 2023, a mortgage…

READ NOW →

Threat Response Unit

7 M

The Notorious ALPHV/BlackCat Ransomware Gang is Attacking Corporations and Public Entit...

Security researchers with eSentire, a top global cybersecurity solutions provider, are warning that…

READ NOW →

TRU Positive/Bulletin

8 M

From DarkGate to DanaBot

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →
6 M

NetWire RAT: The Stealthy Invasion via Frenchy Shellcode

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

6 M

WinSock File Transfer Protocol Vulnerability Exploited

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

15 M

Nitrogen Campaign 2.0: Reloads with Enhanced Capabilities Leading to ALPHV/BlackCat Ran...

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →
8 M

The Wiki-Slack Attack

What do you get when you share a Wikipedia link on Slack? As eSentire Threat Response Unit (TRU) security…

READ NOW →

Cybersecurity Strategy

6 M

Plagued with Cyberattacks: As PE Firms Buy Up Healthcare Organizations, How to Protect ...

A variety of market, societal and economic challenges in recent years have made it harder for healthcare…

READ NOW →
Page
of 43