Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
eSentire will be a Sponsor at the NetDeligence Cyber Risk Summit in Fort…
eSentire will be a Sponsor at the NetDeligence Cyber Risk Summit in…
eSentire is an exhibitor at RSAC 2023. Visit us at Booth 0535.
On January 17th, 2020, Microsoft disclosed a memory corruption vulnerability in Internet Explorer's Scripting Engine, noting it is actively being exploited in limited targeted attacks .
To successfully exploit this vulnerability, an attacker would be required to convince a victim to open a crafted HTML document or webpage via Internet Explorer. If exploited, an unauthenticated attacker could remotely execute malicious code in the context of the current user. It is recommended that organizations reduce their risk by discouraging use of Internet Explorer or by implementing the workarounds offered by Microsoft.
What we’re doing about it:
What you should do about it:
This vulnerability (CVE-2020-0674) allows an unauthenticated attacker to execute arbitrary code remotely if they can convince a user to run the code. Malicious code can come packaged in any maliciously crafted web page or document compatible with Internet Explorer Scripting Engine, a default service on Windows devices .
To exploit this vulnerability the attacker would need to serve the victim malicious content via Internet Explorer. In one scenario the method of exploitation is via email, with the attacker serving malicious links or documents leading to the Scripting Engine exploit.
Currently, there is minimal technical information for this vulnerability. Microsoft has stated that there have been limited targeted attacks. At this time eSentire has not observed attacks exploiting this vulnerability, nor is there public information on the confirmed attacks.