Webinar

March 2026 TRU Intelligence Briefing On-Demand

Join eSentire’s Threat Response Unit (TRU) as they share new research-driven observations of malware, notable vulnerabilities, threat actor groups, and cyber activity affecting the threat landscape. 

During the March Threat Intelligence Briefing, TRU reviewed:

  • The Weaponization of Voice - Advanced Vishing Tactics from Social Engineering to AI-Powered Attacks: The evolution of sophisticated vishing attacks with a focus on threat actors such as Shiny Hunters who leverage voice phishing to gain initial access to corporate environments. Learn how attackers abuse trusted platforms like Microsoft Teams to trick victims into installing RMM tools and Malwares, and how AI-powered voice spoofing is becoming an emerging tool in the vishing arsenal. The session includes real-world attack chains, current trends, and defensive recommendations.
  • Remotely Executing Code Using Ivanti Endpoint Mobile Manager: A review of CVE-2026-1281 and CVE-2026-1340, two code injection vulnerabilities that have been exploited in the wild and highlight how threat actors are abusing them.
  • Threat Landscape: A discussion around recently disclosed vulnerabilities in Dell, Cisco, and BeyondTrust (CVE-2026-22769 - Dell, CVE-2026-20217 - Cisco, and CVE-2026-1731 - BeyondTrust) and a highlight of notable malware observations including DEV#POPPER RAT, 123 Stealer, and Winos4.0.
  • A brief update on cyber activity associated with the ongoing Iran conflict. 

This webinar also included a live Q&A. 

Watch the Webinar

Join eSentire’s Threat Response Unit (TRU) as they share new research-driven observations of malware, notable vulnerabilities, threat actor groups, and cyber activity affecting the threat landscape. 

During the March Threat Intelligence Briefing, TRU reviewed:

  • The Weaponization of Voice - Advanced Vishing Tactics from Social Engineering to AI-Powered Attacks: The evolution of sophisticated vishing attacks with a focus on threat actors such as Shiny Hunters who leverage voice phishing to gain initial access to corporate environments. Learn how attackers abuse trusted platforms like Microsoft Teams to trick victims into installing RMM tools and Malwares, and how AI-powered voice spoofing is becoming an emerging tool in the vishing arsenal. The session includes real-world attack chains, current trends, and defensive recommendations.
  • Remotely Executing Code Using Ivanti Endpoint Mobile Manager: A review of CVE-2026-1281 and CVE-2026-1340, two code injection vulnerabilities that have been exploited in the wild and highlight how threat actors are abusing them.
  • Threat Landscape: A discussion around recently disclosed vulnerabilities in Dell, Cisco, and BeyondTrust (CVE-2026-22769 - Dell, CVE-2026-20217 - Cisco, and CVE-2026-1731 - BeyondTrust) and a highlight of notable malware observations including DEV#POPPER RAT, 123 Stealer, and Winos4.0.
  • A brief update on cyber activity associated with the ongoing Iran conflict. 

This webinar also included a live Q&A. 

Get The Webinar