The eSentire Blog

Cybersecurity Strategy

6 M

Key Learnings from the Tempur Sealy Ransomware Attack

For members of the notorious ALPHV, also known as BlackCat, ransomware group, it’s been some great few months. For…

READ NOW →

TRU Positive/Bulletin

3 M

Machine-Learning Powered BlueSteel and MDR for Endpoint Prevent Takeover by Coinmining ...

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

2 M

MDR for Endpoint Identifies Exploitation of Sitecore Experience Platform RCE (CVE-2021-...

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

3 M

Years Old Infection Discovered After Installing the eSentire MDR for Endpoint Agent

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

2 M

eSentire MDR for Endpoint Prevents Purple Fox Exploit Targeting Windows Machine

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

3 M

Gootkit Identified Via Lead-Driven Threat Hunt

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Cybersecurity Strategy

2 M

Threat Hunting Cyber Risks and Safeguarding Intellectual Property in High-Risk Location...

This blog was originally published on CyFIR.com and has been reposted as-is here following eSentire’s acquisition…

READ NOW →

Endpoint Protection

5 M

The Importance of “Forensic” Capabilities When Choosing an Endpoint Protection Provider

This blog was originally published on CyFIR.com and has been reposted as-is here following eSentire’s acquisition…

READ NOW →

Managed Detection and Response

6 M

eSentire MDR is now integrated with Microsoft Defender for Endpoint:

We now offer integrated detection, investigation and response for Microsoft Defender for Endpoint users as part of…

READ NOW →

Threat Intelligence

4 M

The SolarWinds supply chain compromise (Part 2):

In our recent post about the SolarWinds “Sunburst” supply chain compromise, we examined the importance of…

READ NOW →

Endpoint Protection

3 M

Endpoints are the new cybersecurity front lines of defense

It seems customary now to start a blog post or report with some commentary about 2020 being a year of…

READ NOW →

Endpoint Protection

2 M

Teaming up with VMware Carbon Black to Hunt Evasive Malware

Beyond the first-order health effects of the COVID-19 and the second-order impact on the social and economic…

READ NOW →
Page
of 2