The eSentire Blog

Cybersecurity Strategy

7 M

Maturity-Based Approach vs. Risk-Based Approach: What’s the Right Answer?

The influx of cyber attacks within the past few years have painted a dire image for the C-suite and the boardroom.…

READ NOW →

TRU Positive/Bulletin

3 M

eSentire MDR for Endpoint Prevents Purple Fox Exploit Targeting Windows Machine

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

4 M

Gootkit Identified Via Lead-Driven Threat Hunt

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Threat Response Unit

4 M

PetitPotam NTLM Relay Attack

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Cybersecurity Strategy

4 M

How to Reduce the Impact of a Ransomware Attack

If there’s anything organizations should have learnt within the past year, it’s that cyber defenses can, and…

READ NOW →

Cybersecurity Strategy

5 M

How Your Organization Can Prevent a Ransomware Attack

It seems that every week, there are alarming headlines announcing yet another ransomware attack - evidence that…

READ NOW →

Zero-Days

4 M

PrintNightmare Zero-Day Vulnerability Leaked

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Threat Intelligence

2 M

Vulnerable Supply-Chain Software and George Santayana

“Those who cannot remember the past are condemned to repeat it.” It’s a fact: All non-trivial software code…

READ NOW →

Cybersecurity Strategy

7 M

Hooked by Phisherman: Quarterbacking Breach Response with Law Enforcement

RSA Conference 2021, one of the most significant events on the cybersecurity calendar, has come and gone. We know…

READ NOW →

Threat Intelligence

5 M

Is History Repeating Itself with the Latest Kaseya VSA Compromise?

On July 2, 2021, REvil (a.k.a. Sodinokibi), the Russia-affiliated ransomware-as-a-service group, exploited…

READ NOW →

TRU Positive/Bulletin

3 M

Solarmarker Shifts Infrastructure in Recent Drive-By Attacks

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Cybersecurity Strategy

5 M

Better Together: How Combining MDR and IR Create Stronger Cyber Resilience

It’s impossible for businesses to participate in today’s interconnected and data-centric economy without becoming…

READ NOW →
Page
of 36