Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Protect assets from ransomware, trojans, rootkits and more.
Intelligence and visibility across AWS, O365, DevOps and more.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
eSentire is a sponsor for 451 Nexus.
Join experts from eSentire and VMware Carbon Black as they debunk…
Join Tiff Cook, eSentire's Sr. Director of Incident Response and Bill…
On January 17th, 2020, Microsoft disclosed a memory corruption vulnerability in Internet Explorer's Scripting Engine, noting it is actively being exploited in limited targeted attacks .
To successfully exploit this vulnerability, an attacker would be required to convince a victim to open a crafted HTML document or webpage via Internet Explorer. If exploited, an unauthenticated attacker could remotely execute malicious code in the context of the current user. It is recommended that organizations reduce their risk by discouraging use of Internet Explorer or by implementing the workarounds offered by Microsoft.
What we’re doing about it:
What you should do about it:
This vulnerability (CVE-2020-0674) allows an unauthenticated attacker to execute arbitrary code remotely if they can convince a user to run the code. Malicious code can come packaged in any maliciously crafted web page or document compatible with Internet Explorer Scripting Engine, a default service on Windows devices .
To exploit this vulnerability the attacker would need to serve the victim malicious content via Internet Explorer. In one scenario the method of exploitation is via email, with the attacker serving malicious links or documents leading to the Scripting Engine exploit.
Currently, there is minimal technical information for this vulnerability. Microsoft has stated that there have been limited targeted attacks. At this time eSentire has not observed attacks exploiting this vulnerability, nor is there public information on the confirmed attacks.