The eSentire Blog

Ransomware

1 M

CNN Seeks Input from eSentire VP Mark Sangster About the Rise in Ransomware Attacks Aga...

eSentire VP Mark Sangster joins CNN to discuss the drivers behind the increase in ransomware attacks against the…

READ NOW →

TRU Positive/Bulletin

3 M

IcedID Malware

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Threat Response Unit

5 M

The Dark Side of the

Number of Victims Listed New Since January 1st, 2021 Victim Profiles 59 37 Victims located…

READ NOW →

Ransomware

4 M

Understanding Modern Ransomware

A few months ago we posted The SunWalker Incident: Netwalker and SunCrypt Ransomware Double-Double Exploitation,…

READ NOW →

Threat Response Unit

6 M

The SunWalker Incident: Netwalker and SunCrypt Ransomware Double-Double Exploitation

Summary: After eight long hours attempting to siege an online education institution – including initial access,…

READ NOW →

Threat Intelligence

3 M

How Current Ransomware Tactics Look

You can’t rush the process of smoking a brisket, what I consider the peak of BBQ prowess. For a 15-pound brisket,…

READ NOW →

Threat Intelligence

3 M

Why the Travelex Incident Portends the Changing Nature of Ransomware

Originally posted in Infosecurity Magazine January 29, 2020 Like most New Year’s resolutions, most go off the…

READ NOW →

Threat Intelligence

1 M

eSentire Threat Intelligence Spotlight: The Shifting Framework of Modern Malware

Modern malware is increasingly sophisticated. While newer antivirus solutions provide a more effective layer of…

READ NOW →

Ransomware

4 M

How can you fight ransomware? Solutions to 11 common ransomware failure points

Ransomware is an increasingly appealing cyberattack method. Compared to traditional methods, ransomware typically…

READ NOW →

Threat Intelligence

3 M

Threat summary report: why today's cybercriminals like to keep it simple

Cybercriminals have moved away from the sophisticated kinds of attacks we’ve seen in recent years. Today, they’re…

READ NOW →

Ransomware

4 M

Wannacry? our predictions for what's coming next

Last Friday, a massive ransomware attack struck organizations in at least 100 countries. The attack, named…

READ NOW →

Threat Intelligence

4 M

Cyber threats 101: how to prevent file-based malware and botnets

Malware is malicious code that’s used to obtain unrestricted access to a victim machine. This makes the ability to…

READ NOW →
Page
of 5