The eSentire Blog

TRU Positive/Bulletin

3 M

Solarmarker Drive-By Social Engineering Threat

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Threat Intelligence

6 M

Don’t Get Reeled into a Phishing Scam

It’s an age-old story: you open an email sent from your bank notifying you of suspicious activity in your account…

READ NOW →

AI/ML

3 M

Using a Machine Learning Threat Detection Model to Extract and Classify Malicious Macros

Threat actors have long relied on the use of macros to create malicious documents that are emailed to unknowing…

READ NOW →

TRU Positive/Bulletin

3 M

ProxyShell Microsoft Exchange Vulnerabilities Exploited

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Cybersecurity Strategy

7 M

Maturity-Based Approach vs. Risk-Based Approach: What’s the Right Answer?

The influx of cyber attacks within the past few years have painted a dire image for the C-suite and the boardroom.…

READ NOW →

TRU Positive/Bulletin

3 M

eSentire MDR for Endpoint Prevents Purple Fox Exploit Targeting Windows Machine

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

4 M

Gootkit Identified Via Lead-Driven Threat Hunt

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Threat Response Unit

4 M

PetitPotam NTLM Relay Attack

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Cybersecurity Strategy

4 M

How to Reduce the Impact of a Ransomware Attack

If there’s anything organizations should have learnt within the past year, it’s that cyber defenses can, and…

READ NOW →

Cybersecurity Strategy

5 M

How Your Organization Can Prevent a Ransomware Attack

It seems that every week, there are alarming headlines announcing yet another ransomware attack - evidence that…

READ NOW →

Zero-Days

4 M

PrintNightmare Zero-Day Vulnerability Leaked

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Threat Intelligence

2 M

Vulnerable Supply-Chain Software and George Santayana

“Those who cannot remember the past are condemned to repeat it.” It’s a fact: All non-trivial software code…

READ NOW →
Page
of 35