Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Protect assets from ransomware, trojans, rootkits and more.
Intelligence and visibility across AWS, O365, DevOps and more.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Join eSentire as they explore how to build a comprehensive training and…
The Texas Cyber Summit is a multi-track multi-day deeply technical…
Join Dustin Hillard, CTO at eSentire, and Tia Hopkins, VP, Cyber Risk…
On July 11th, 2021, Kaseya released security patches for multiple vulnerabilities impacting the Kaseya VSA product, that was actively exploited in the recent REvil ransomware campaign. Kaseya’s Cloud offering, Kaseya SaaS VSA, was brought back online at the same time as security patches were released.
Organizations are recommended to review the Kaseya playbook for patching, and after performing a business impact review, apply the relevant security patches.
This incident was initially speculated to be caused by a supply-chain attack against Kaseya but has since been traced back to a chain of zero-day vulnerabilities in the Kaseya platform. Patched vulnerabilities are as follows:
Three additional issues were fixed but did not receive CVE designations:
To date, the REvil attack on Kaseya products resulted in approximately 60 Kaseya customers, including MSPs, being impacted. Including MSP’s customers, approximately 1,500 organizations total were impacted by REvil ransomware.