Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports & papers.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
Episodes on cybersecurity strategy and threat intel.
eSentire will be hosting a bootcamp with AVANT.
eSentire will be exhibiting at the UK's largest insurance broking event.
Join eSentire’s half-day Cybersecurity Insights Summit to hear from a…
CTSLabs has published a whitepaper outlining 13 critical vulnerabilities discovered in AMD processors. The vulnerabilities, classified under the names RyzenFall, Fallout, Chimera and MasterKey, affect AMD Secure Processors and AMD Ryzen Chipsets. CTSLabs states that if exploited, these vulnerabilities would allow attackers to install malicious code inside the Secure Processor, allow read and write access to protected memory areas, steal network credentials protected by Windows Credential Guard, cause physical damage to hardware and perform a variety of other malicious tasks. If their statement is accurate, this represents a critical and widespread security issue.
According to the whitepaper, successful exploitation requires local access with elevated privileges. eSentire has not observed any attacks in the wild and no proof of concept code has been identified .
Technical details for these vulnerabilities have not being released. As such, eSentire cannot attest to the validity of CTSLabs’ claims. In a statement, AMD was recently made aware of the issues and is currently investigating. Mitigating actions should be reserved until the findings and technical details have been confirmed by AMD.