Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
eSentire will be a sponsor at the Seattle CyberSecurity Conference.
eSentire will be a Sponsor at the NetDiligence Cyber Risk Summit in…
eSentire will be presenting and is a Gold Sponsor at the CyberRisk…
UPDATE: On January 29th, 2021, SonicWall confirmed that a threat actor(s) is targeting SMA 100 series devices and that SonicWall customers have identified attacks employing stolen credentials.
THE THREAT:
The network security appliances company, SonicWall, has publicly acknowledged it was targeted in an attack involving multiple zero-day vulnerabilities. In this attack, threat actors exploited previously unknown vulnerabilities in the SonicWall Secure Mobile Access product. It is currently unclear whether SonicWall customers were affected by the attack, or whether these vulnerabilities were exploited on a wider scale.
Organizations employing the vulnerable products are recommended to review their SonicWall configurations and apply the recommendations provided below.
What we’re doing about it
What you should do about it
Additional information
SonicWall has not attributed the attack to any specific actor at this time but did state that the group is highly sophisticated and exploited multiple zero-day vulnerabilities. The knowledge base article posted by SonicWall will be updated with additional information as it becomes available.
Currently, information related to the vulnerabilities is limited. CVE numbers and vulnerability types are currently not public knowledge.
Known Impacted SonicWall Products (as of January 25th, 2021):
Products Currently Under Review by SonicWall (as of January 25th, 2021):
References: