The eSentire Blog

TRU Positive/Bulletin

5 M

PaperCut Vulnerability Exploited to Deliver Cryptocurrency Miner to Education Sector Cu...

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Company News

2 M

eSentire Recognized as a Top Cybersecurity Leader in the Middle East

We are thrilled to be recognized as a top cybersecurity leader with multiple industry recognitions across the…

READ NOW →

TRU Positive/Bulletin

20 M

eSentire Threat Intelligence Malware Analysis: Vidar Stealer

Vidar Stealer is an information stealer (infostealer) malware that first appeared on hacking forums at the end of…

READ NOW →

TRU Positive/Bulletin

9 M

Threat Actors Using Fake QuickBooks Software to Scam Organizations

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Ransomware

6 M

What is Malware-as-a-Service (MaaS)?

The cybercrime economy evolved rapidly in recent years. Gone are the days when threat actors were lonely hackers…

READ NOW →

TRU Positive/Bulletin

4 M

Protecting End Users Against the Gootloader Malware Threat Using the Gootloader Operato...

eSentire’s Threat Response Unit (TRU), led by researchers Joe Stewart and Keegan Keplinger, have launched a…

READ NOW →

Vulnerability Scanning/Management

2 M

eSentire Named Tenable’s 2023 Top MSSP Partner in North America

eSentire is thrilled to be recognized as Tenable’s 2023 Top Managed Security Services Provider (MSSP) Partner in…

READ NOW →

Managed Detection and Response

4 M

eSentire Achieves Microsoft Verified Managed XDR Solution Status

We are excited to announce that eSentire has achieved Microsoft verified Managed Extended Detection and Response…

READ NOW →

Cybersecurity Strategy

5 M

Poor Cyber Defences Are Damaging Canada’s Economy

Cyberattacks may seem like relatively minor inconveniences to the average consumer. The reality is that such…

READ NOW →

Cybersecurity Strategy

8 M

Building a Cybersecurity Foundation to Protect Construction Firms from Ransomware Attac...

Construction firms are increasingly targets of cyber and ransomware attacks that lead to costly project delays and…

READ NOW →

Cybersecurity Strategy

6 M

Building Resiliency: Three Core Actions To Create Stronger Cybersecurity

This article is contributed by Ray Texter, Chief of Information Security at Texas United Management, and a…

READ NOW →

TRU Positive/Bulletin

5 M

GuLoader Targeting the Financial Sector Using a Tax-themed Phishing Lure

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →
Page
of 47