The eSentire Blog

TRU Positive/Bulletin

9 M

D3F@ck Loader, the New MaaS Loader

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat…

READ NOW →

TRU Positive/Bulletin

8 M

FakeBat Malware Distributing via Fake Browser Updates

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Threat Response Unit

7 M

Building an Effective Threat Hunting Program for Proactive Cyber Defense

At its core, threat hunting is the practice of proactively searching for signs of malicious activities or…

READ NOW →

TRU Positive/Bulletin

6 M

Don't Take the Bait: The XWorm Tax Scam

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

5 M

SolarMarker's Shift to PyInstaller Tactics

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

5 M

Tax Season Alert: Beware of GuLoader and Remcos RAT

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

6 M

The Return of the Bat: FakeBat’s Payk RunPE Arsenal

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

14 M

Unraveling Not AZORult but Koi Loader: A Precursor to Koi Stealer

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Threat Response Unit

6 M

How the Biggest Ransomware-as-a-Service (RaaS) Operators Gain Initial Access to Your En...

Did you know that the entity that deploys ransomware in an environment may not actually be the entity that…

READ NOW →

Threat Response Unit

12 M

Leveraging the NIST Cybersecurity Framework for Improved Threat Detection and Response

Threat detection and response are critical components of a robust cybersecurity strategy. However, simply relying…

READ NOW →

Threat Response Unit

6 M

Enhancing Your Security Posture with the New eSentire Threat Intelligence Offering

With the recent launch of our first standalone cybersecurity product, eSentire Threat Intelligence, we thought we…

READ NOW →

TRU Positive/Bulletin

6 M

Ransomware Precursor Activity Traced to Compromised Vendor Account

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →
Page
of 23