Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
On March 14, eSentire released a security advisory relating to vulnerabilities in AMD processors, reported by the Israeli security firm, CTS Labs 1. On March 21, AMD released a statement both acknowledging and downplaying the severity of the vulnerabilities. AMD also provided timelines on planned mitigations 2. eSentire Threat Intelligence maintains our original assessment that these vulnerabilities do not pose an immediate threat to customers. Should proof-of-concept code be released or exploitation of the vulnerabilities in the wild be observed, eSentire Threat Intelligence will reassess the severity of this threat.
On March 13, CTS Labs published a whitepaper outlining 13 critical vulnerabilities discovered in AMD processors. These findings were unconfirmed by AMD until a full technical review could be completed. On March 21, AMD completed their review and released their findings 2.
The 13 reported vulnerabilities have been categorized into three groups by AMD according to the devices they affect.
In order to exploit the above vulnerabilities, a threat actor would require administrative access on the device and a high degree of technical knowledge.
If exploited, these vulnerabilities would allow threat actors to circumvent security controls, make changes that persist after a device reboot, install difficult to detect malware and access physical memory through the chipset.
AMD has not released security patches for these vulnerabilities but states that patches can be expected in the next few weeks. At this time, eSentire has not observed any of the released vulnerabilities being exploited in the wild.
Get notified when there's a new security advisory, and receive the latest news, intel and helpful tools & assets. You can unsubscribe anytime.